diff --git a/docs/AdvisoryADPContainer.md b/docs/AdvisoryADPContainer.md index 3609a8db..d5c340a5 100644 --- a/docs/AdvisoryADPContainer.md +++ b/docs/AdvisoryADPContainer.md @@ -11,7 +11,7 @@ Name | Type | Description | Notes **impacts** | [**List[AdvisoryImpact]**](AdvisoryImpact.md) | OK | [optional] **metrics** | [**List[AdvisoryMetric]**](AdvisoryMetric.md) | OK | [optional] **problem_types** | [**List[AdvisoryMProblemTypes]**](AdvisoryMProblemTypes.md) | OK | [optional] -**provider_metadata** | [**AdvisoryMProviderMetadata**](AdvisoryMProviderMetadata.md) | OK | [optional] +**provider_metadata** | [**AdvisoryMProviderMetadata**](AdvisoryMProviderMetadata.md) | | [optional] **references** | [**List[AdvisoryMReference]**](AdvisoryMReference.md) | | [optional] **tags** | **List[str]** | OK | [optional] **title** | **str** | OK | [optional] diff --git a/docs/AdvisoryAdvisoryDetails.md b/docs/AdvisoryAdvisoryDetails.md index 0c0a106b..fea36c82 100644 --- a/docs/AdvisoryAdvisoryDetails.md +++ b/docs/AdvisoryAdvisoryDetails.md @@ -7,9 +7,9 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **bugzilla** | [**AdvisoryBugzilla**](AdvisoryBugzilla.md) | | [optional] **cve** | [**AdvisoryOvalCVE**](AdvisoryOvalCVE.md) | | [optional] -**issued** | [**AdvisoryIssued**](AdvisoryIssued.md) | | [optional] +**issued** | **object** | | [optional] **severity** | **str** | | [optional] -**updated** | [**AdvisoryUpdated**](AdvisoryUpdated.md) | | [optional] +**updated** | **object** | | [optional] ## Example diff --git a/docs/AdvisoryAffected.md b/docs/AdvisoryAffected.md index 02baa52f..954157a2 100644 --- a/docs/AdvisoryAffected.md +++ b/docs/AdvisoryAffected.md @@ -5,8 +5,8 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**database_specific** | **object** | The meaning of the values within the object is entirely defined by the database | [optional] -**ecosystem_specific** | **object** | The meaning of the values within the object is entirely defined by the ecosystem | [optional] +**database_specific** | **object** | | [optional] +**ecosystem_specific** | **object** | | [optional] **package** | [**AdvisoryOSVPackage**](AdvisoryOSVPackage.md) | | [optional] **ranges** | [**List[AdvisoryRange]**](AdvisoryRange.md) | | [optional] **severity** | [**List[AdvisorySeverity]**](AdvisorySeverity.md) | | [optional] diff --git a/docs/AdvisoryCSAF.md b/docs/AdvisoryCSAF.md index 14bd5959..d90038b2 100644 --- a/docs/AdvisoryCSAF.md +++ b/docs/AdvisoryCSAF.md @@ -5,9 +5,9 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**document** | [**AdvisoryDocumentMetadata**](AdvisoryDocumentMetadata.md) | Document contains metadata about the CSAF document itself. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property | [optional] +**document** | [**AdvisoryDocumentMetadata**](AdvisoryDocumentMetadata.md) | | [optional] **notes** | [**List[AdvisoryCSAFNote]**](AdvisoryCSAFNote.md) | Notes holds notes associated with the whole document. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3217-document-property---notes | [optional] -**product_tree** | [**AdvisoryProductBranch**](AdvisoryProductBranch.md) | ProductTree contains information about the product tree (branches only). https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property | [optional] +**product_tree** | [**AdvisoryProductBranch**](AdvisoryProductBranch.md) | | [optional] **vulnerabilities** | [**List[AdvisoryCSAFVulnerability]**](AdvisoryCSAFVulnerability.md) | Vulnerabilities contains information about the vulnerabilities, (i.e. CVEs), associated threats, and product status. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#323-vulnerabilities-property | [optional] ## Example diff --git a/docs/AdvisoryCVRFReference.md b/docs/AdvisoryCVRFReference.md deleted file mode 100644 index aeb3231c..00000000 --- a/docs/AdvisoryCVRFReference.md +++ /dev/null @@ -1,30 +0,0 @@ -# AdvisoryCVRFReference - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**description** | **str** | | [optional] -**url** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_cvrf_reference import AdvisoryCVRFReference - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryCVRFReference from a JSON string -advisory_cvrf_reference_instance = AdvisoryCVRFReference.from_json(json) -# print the JSON string representation of the object -print(AdvisoryCVRFReference.to_json()) - -# convert the object into a dict -advisory_cvrf_reference_dict = advisory_cvrf_reference_instance.to_dict() -# create an instance of AdvisoryCVRFReference from a dict -advisory_cvrf_reference_from_dict = AdvisoryCVRFReference.from_dict(advisory_cvrf_reference_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryCVSSV40.md b/docs/AdvisoryCVSSV40.md index dc571aed..31783ba9 100644 --- a/docs/AdvisoryCVSSV40.md +++ b/docs/AdvisoryCVSSV40.md @@ -1,5 +1,6 @@ # AdvisoryCVSSV40 +this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics ## Properties diff --git a/docs/AdvisoryCWENode.md b/docs/AdvisoryCWENode.md deleted file mode 100644 index 230e55c5..00000000 --- a/docs/AdvisoryCWENode.md +++ /dev/null @@ -1,32 +0,0 @@ -# AdvisoryCWENode - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**cweid** | **str** | | [optional] -**description** | **str** | | [optional] -**id** | **str** | | [optional] -**name** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_cwe_node import AdvisoryCWENode - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryCWENode from a JSON string -advisory_cwe_node_instance = AdvisoryCWENode.from_json(json) -# print the JSON string representation of the object -print(AdvisoryCWENode.to_json()) - -# convert the object into a dict -advisory_cwe_node_dict = advisory_cwe_node_instance.to_dict() -# create an instance of AdvisoryCWENode from a dict -advisory_cwe_node_from_dict = AdvisoryCWENode.from_dict(advisory_cwe_node_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryCvrf.md b/docs/AdvisoryCvrf.md index dda9a5a3..003a87fb 100644 --- a/docs/AdvisoryCvrf.md +++ b/docs/AdvisoryCvrf.md @@ -6,12 +6,6 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **cve** | **List[str]** | | [optional] -**notes** | [**List[AdvisoryDocumentNote]**](AdvisoryDocumentNote.md) | | [optional] -**product_tree** | [**AdvisoryProductTree**](AdvisoryProductTree.md) | | [optional] -**references** | [**List[AdvisoryCVRFReference]**](AdvisoryCVRFReference.md) | | [optional] -**title** | **str** | | [optional] -**tracking** | [**AdvisoryDocumentTracking**](AdvisoryDocumentTracking.md) | | [optional] -**vulnerabilities** | [**List[AdvisoryVulnerability]**](AdvisoryVulnerability.md) | | [optional] ## Example diff --git a/docs/AdvisoryCwes.md b/docs/AdvisoryCwes.md index 0e550e43..d9fe1244 100644 --- a/docs/AdvisoryCwes.md +++ b/docs/AdvisoryCwes.md @@ -5,8 +5,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**nodes** | [**List[AdvisoryCWENode]**](AdvisoryCWENode.md) | | [optional] -**total_count** | **int** | | [optional] +**nodes** | **List[object]** | | [optional] ## Example diff --git a/docs/AdvisoryDateTime.md b/docs/AdvisoryDateTime.md deleted file mode 100644 index 59f961f8..00000000 --- a/docs/AdvisoryDateTime.md +++ /dev/null @@ -1,29 +0,0 @@ -# AdvisoryDateTime - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**var_date** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_date_time import AdvisoryDateTime - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryDateTime from a JSON string -advisory_date_time_instance = AdvisoryDateTime.from_json(json) -# print the JSON string representation of the object -print(AdvisoryDateTime.to_json()) - -# convert the object into a dict -advisory_date_time_dict = advisory_date_time_instance.to_dict() -# create an instance of AdvisoryDateTime from a dict -advisory_date_time_from_dict = AdvisoryDateTime.from_dict(advisory_date_time_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryDocumentMetadata.md b/docs/AdvisoryDocumentMetadata.md index e7013d51..d0251fa7 100644 --- a/docs/AdvisoryDocumentMetadata.md +++ b/docs/AdvisoryDocumentMetadata.md @@ -1,5 +1,6 @@ # AdvisoryDocumentMetadata +Document contains metadata about the CSAF document itself. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property ## Properties diff --git a/docs/AdvisoryDocumentNote.md b/docs/AdvisoryDocumentNote.md deleted file mode 100644 index 2a9e51f2..00000000 --- a/docs/AdvisoryDocumentNote.md +++ /dev/null @@ -1,31 +0,0 @@ -# AdvisoryDocumentNote - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**text** | **str** | | [optional] -**title** | **str** | | [optional] -**type** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_document_note import AdvisoryDocumentNote - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryDocumentNote from a JSON string -advisory_document_note_instance = AdvisoryDocumentNote.from_json(json) -# print the JSON string representation of the object -print(AdvisoryDocumentNote.to_json()) - -# convert the object into a dict -advisory_document_note_dict = advisory_document_note_instance.to_dict() -# create an instance of AdvisoryDocumentNote from a dict -advisory_document_note_from_dict = AdvisoryDocumentNote.from_dict(advisory_document_note_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryDocumentTracking.md b/docs/AdvisoryDocumentTracking.md deleted file mode 100644 index 9afd35ce..00000000 --- a/docs/AdvisoryDocumentTracking.md +++ /dev/null @@ -1,34 +0,0 @@ -# AdvisoryDocumentTracking - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**current_release_date** | **str** | | [optional] -**id** | **str** | | [optional] -**initial_release_date** | **str** | | [optional] -**revision_history** | [**List[AdvisoryRevision]**](AdvisoryRevision.md) | | [optional] -**status** | **str** | | [optional] -**version** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_document_tracking import AdvisoryDocumentTracking - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryDocumentTracking from a JSON string -advisory_document_tracking_instance = AdvisoryDocumentTracking.from_json(json) -# print the JSON string representation of the object -print(AdvisoryDocumentTracking.to_json()) - -# convert the object into a dict -advisory_document_tracking_dict = advisory_document_tracking_instance.to_dict() -# create an instance of AdvisoryDocumentTracking from a dict -advisory_document_tracking_from_dict = AdvisoryDocumentTracking.from_dict(advisory_document_tracking_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryIssued.md b/docs/AdvisoryIssued.md deleted file mode 100644 index e37cf3a2..00000000 --- a/docs/AdvisoryIssued.md +++ /dev/null @@ -1,29 +0,0 @@ -# AdvisoryIssued - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**var_date** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_issued import AdvisoryIssued - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryIssued from a JSON string -advisory_issued_instance = AdvisoryIssued.from_json(json) -# print the JSON string representation of the object -print(AdvisoryIssued.to_json()) - -# convert the object into a dict -advisory_issued_dict = advisory_issued_instance.to_dict() -# create an instance of AdvisoryIssued from a dict -advisory_issued_from_dict = AdvisoryIssued.from_dict(advisory_issued_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryMProviderMetadata.md b/docs/AdvisoryMProviderMetadata.md index 0d8161bd..80633f95 100644 --- a/docs/AdvisoryMProviderMetadata.md +++ b/docs/AdvisoryMProviderMetadata.md @@ -1,5 +1,6 @@ # AdvisoryMProviderMetadata +OK ## Properties diff --git a/docs/AdvisoryMicrosoftDriverBlockList.md b/docs/AdvisoryMicrosoftDriverBlockList.md index 1edda679..66df864f 100644 --- a/docs/AdvisoryMicrosoftDriverBlockList.md +++ b/docs/AdvisoryMicrosoftDriverBlockList.md @@ -7,7 +7,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **date_added** | **str** | | [optional] **file_id** | **str** | From FileAttrib or Deny | [optional] -**file_metadata** | [**AdvisoryMicrosoftFileMetadata**](AdvisoryMicrosoftFileMetadata.md) | File-level metadata | [optional] +**file_metadata** | [**AdvisoryMicrosoftFileMetadata**](AdvisoryMicrosoftFileMetadata.md) | | [optional] ## Example diff --git a/docs/AdvisoryMicrosoftFileMetadata.md b/docs/AdvisoryMicrosoftFileMetadata.md index 538a720b..924fb0d6 100644 --- a/docs/AdvisoryMicrosoftFileMetadata.md +++ b/docs/AdvisoryMicrosoftFileMetadata.md @@ -1,5 +1,6 @@ # AdvisoryMicrosoftFileMetadata +File-level metadata ## Properties diff --git a/docs/AdvisoryProductBranch.md b/docs/AdvisoryProductBranch.md index 9d372a7d..6dc7e6d7 100644 --- a/docs/AdvisoryProductBranch.md +++ b/docs/AdvisoryProductBranch.md @@ -1,5 +1,6 @@ # AdvisoryProductBranch +ProductTree contains information about the product tree (branches only). https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property ## Properties diff --git a/docs/AdvisoryProductTree.md b/docs/AdvisoryProductTree.md deleted file mode 100644 index 9bc6d7d0..00000000 --- a/docs/AdvisoryProductTree.md +++ /dev/null @@ -1,29 +0,0 @@ -# AdvisoryProductTree - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**relationships** | [**List[AdvisoryRelationship]**](AdvisoryRelationship.md) | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_product_tree import AdvisoryProductTree - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryProductTree from a JSON string -advisory_product_tree_instance = AdvisoryProductTree.from_json(json) -# print the JSON string representation of the object -print(AdvisoryProductTree.to_json()) - -# convert the object into a dict -advisory_product_tree_dict = advisory_product_tree_instance.to_dict() -# create an instance of AdvisoryProductTree from a dict -advisory_product_tree_from_dict = AdvisoryProductTree.from_dict(advisory_product_tree_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryRelationship.md b/docs/AdvisoryRelationship.md deleted file mode 100644 index 5b18b32c..00000000 --- a/docs/AdvisoryRelationship.md +++ /dev/null @@ -1,31 +0,0 @@ -# AdvisoryRelationship - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**product_reference** | **str** | | [optional] -**relates_to_product_reference** | **str** | | [optional] -**relation_type** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_relationship import AdvisoryRelationship - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryRelationship from a JSON string -advisory_relationship_instance = AdvisoryRelationship.from_json(json) -# print the JSON string representation of the object -print(AdvisoryRelationship.to_json()) - -# convert the object into a dict -advisory_relationship_dict = advisory_relationship_instance.to_dict() -# create an instance of AdvisoryRelationship from a dict -advisory_relationship_from_dict = AdvisoryRelationship.from_dict(advisory_relationship_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryRevision.md b/docs/AdvisoryRevision.md deleted file mode 100644 index 2b5094a2..00000000 --- a/docs/AdvisoryRevision.md +++ /dev/null @@ -1,31 +0,0 @@ -# AdvisoryRevision - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**var_date** | **str** | | [optional] -**description** | **str** | | [optional] -**number** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_revision import AdvisoryRevision - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryRevision from a JSON string -advisory_revision_instance = AdvisoryRevision.from_json(json) -# print the JSON string representation of the object -print(AdvisoryRevision.to_json()) - -# convert the object into a dict -advisory_revision_dict = advisory_revision_instance.to_dict() -# create an instance of AdvisoryRevision from a dict -advisory_revision_from_dict = AdvisoryRevision.from_dict(advisory_revision_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryScoreSet.md b/docs/AdvisoryScoreSet.md deleted file mode 100644 index eee8f8f3..00000000 --- a/docs/AdvisoryScoreSet.md +++ /dev/null @@ -1,30 +0,0 @@ -# AdvisoryScoreSet - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**base_score** | **str** | | [optional] -**vector** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_score_set import AdvisoryScoreSet - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryScoreSet from a JSON string -advisory_score_set_instance = AdvisoryScoreSet.from_json(json) -# print the JSON string representation of the object -print(AdvisoryScoreSet.to_json()) - -# convert the object into a dict -advisory_score_set_dict = advisory_score_set_instance.to_dict() -# create an instance of AdvisoryScoreSet from a dict -advisory_score_set_from_dict = AdvisoryScoreSet.from_dict(advisory_score_set_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryStatus.md b/docs/AdvisoryStatus.md deleted file mode 100644 index 1c1f15fc..00000000 --- a/docs/AdvisoryStatus.md +++ /dev/null @@ -1,30 +0,0 @@ -# AdvisoryStatus - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**product_id** | **List[str]** | | [optional] -**type** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_status import AdvisoryStatus - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryStatus from a JSON string -advisory_status_instance = AdvisoryStatus.from_json(json) -# print the JSON string representation of the object -print(AdvisoryStatus.to_json()) - -# convert the object into a dict -advisory_status_dict = advisory_status_instance.to_dict() -# create an instance of AdvisoryStatus from a dict -advisory_status_from_dict = AdvisoryStatus.from_dict(advisory_status_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryThreat.md b/docs/AdvisoryThreat.md deleted file mode 100644 index d6936a95..00000000 --- a/docs/AdvisoryThreat.md +++ /dev/null @@ -1,30 +0,0 @@ -# AdvisoryThreat - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**severity** | **str** | | [optional] -**type** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_threat import AdvisoryThreat - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryThreat from a JSON string -advisory_threat_instance = AdvisoryThreat.from_json(json) -# print the JSON string representation of the object -print(AdvisoryThreat.to_json()) - -# convert the object into a dict -advisory_threat_dict = advisory_threat_instance.to_dict() -# create an instance of AdvisoryThreat from a dict -advisory_threat_from_dict = AdvisoryThreat.from_dict(advisory_threat_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryUpdate.md b/docs/AdvisoryUpdate.md index 02d61deb..b5c494b1 100644 --- a/docs/AdvisoryUpdate.md +++ b/docs/AdvisoryUpdate.md @@ -9,7 +9,7 @@ Name | Type | Description | Notes **date_added** | **str** | | [optional] **description** | **str** | | [optional] **id** | **str** | sort // key | [optional] -**issued** | [**AdvisoryDateTime**](AdvisoryDateTime.md) | | [optional] +**issued** | **object** | | [optional] **os_arch** | **str** | | [optional] **os_version** | **str** | | [optional] **packages** | [**List[AdvisoryPackage]**](AdvisoryPackage.md) | | [optional] @@ -17,7 +17,7 @@ Name | Type | Description | Notes **severity** | **str** | | [optional] **title** | **str** | | [optional] **type** | **str** | | [optional] -**updated** | [**AdvisoryDateTime**](AdvisoryDateTime.md) | | [optional] +**updated** | **object** | | [optional] ## Example diff --git a/docs/AdvisoryUpdated.md b/docs/AdvisoryUpdated.md deleted file mode 100644 index 9340c5e5..00000000 --- a/docs/AdvisoryUpdated.md +++ /dev/null @@ -1,29 +0,0 @@ -# AdvisoryUpdated - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**var_date** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_updated import AdvisoryUpdated - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryUpdated from a JSON string -advisory_updated_instance = AdvisoryUpdated.from_json(json) -# print the JSON string representation of the object -print(AdvisoryUpdated.to_json()) - -# convert the object into a dict -advisory_updated_dict = advisory_updated_instance.to_dict() -# create an instance of AdvisoryUpdated from a dict -advisory_updated_from_dict = AdvisoryUpdated.from_dict(advisory_updated_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/AdvisoryVulnerability.md b/docs/AdvisoryVulnerability.md deleted file mode 100644 index e01606ce..00000000 --- a/docs/AdvisoryVulnerability.md +++ /dev/null @@ -1,35 +0,0 @@ -# AdvisoryVulnerability - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**cve** | **str** | | [optional] -**cvssscore_sets** | [**AdvisoryScoreSet**](AdvisoryScoreSet.md) | | [optional] -**description** | **str** | | [optional] -**packages** | [**List[AdvisoryVulnCheckPackage]**](AdvisoryVulnCheckPackage.md) | vulncheck addition | [optional] -**product_statuses** | [**List[AdvisoryStatus]**](AdvisoryStatus.md) | | [optional] -**references** | [**List[AdvisoryCVRFReference]**](AdvisoryCVRFReference.md) | | [optional] -**threats** | [**List[AdvisoryThreat]**](AdvisoryThreat.md) | | [optional] - -## Example - -```python -from vulncheck_sdk.models.advisory_vulnerability import AdvisoryVulnerability - -# TODO update the JSON string below -json = "{}" -# create an instance of AdvisoryVulnerability from a JSON string -advisory_vulnerability_instance = AdvisoryVulnerability.from_json(json) -# print the JSON string representation of the object -print(AdvisoryVulnerability.to_json()) - -# convert the object into a dict -advisory_vulnerability_dict = advisory_vulnerability_instance.to_dict() -# create an instance of AdvisoryVulnerability from a dict -advisory_vulnerability_from_dict = AdvisoryVulnerability.from_dict(advisory_vulnerability_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/ApiDateTime.md b/docs/ApiDateTime.md deleted file mode 100644 index 29301382..00000000 --- a/docs/ApiDateTime.md +++ /dev/null @@ -1,29 +0,0 @@ -# ApiDateTime - - -## Properties - -Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- -**var_date** | **str** | | [optional] - -## Example - -```python -from vulncheck_sdk.models.api_date_time import ApiDateTime - -# TODO update the JSON string below -json = "{}" -# create an instance of ApiDateTime from a JSON string -api_date_time_instance = ApiDateTime.from_json(json) -# print the JSON string representation of the object -print(ApiDateTime.to_json()) - -# convert the object into a dict -api_date_time_dict = api_date_time_instance.to_dict() -# create an instance of ApiDateTime from a dict -api_date_time_from_dict = ApiDateTime.from_dict(api_date_time_dict) -``` -[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md) - - diff --git a/docs/ApiEPSS.md b/docs/ApiEPSS.md index fcda7438..5814654f 100644 --- a/docs/ApiEPSS.md +++ b/docs/ApiEPSS.md @@ -1,5 +1,6 @@ # ApiEPSS +exclude EPSS from changelog ## Properties diff --git a/docs/ApiExploitV3Result.md b/docs/ApiExploitV3Result.md index f468e380..33753617 100644 --- a/docs/ApiExploitV3Result.md +++ b/docs/ApiExploitV3Result.md @@ -9,7 +9,7 @@ Name | Type | Description | Notes **commercial_exploit_found** | **bool** | | [optional] **counts** | [**ApiExploitsV3Count**](ApiExploitsV3Count.md) | | [optional] **date_added** | **str** | | [optional] -**epss** | [**ApiEPSS**](ApiEPSS.md) | exclude EPSS from changelog | [optional] +**epss** | [**ApiEPSS**](ApiEPSS.md) | | [optional] **exploits** | [**List[ApiNormalizedExploitV3Entry]**](ApiNormalizedExploitV3Entry.md) | | [optional] **id** | **str** | | [optional] **in_kev** | **bool** | | [optional] diff --git a/docs/ApiImpact.md b/docs/ApiImpact.md index d4d11e75..dbc84726 100644 --- a/docs/ApiImpact.md +++ b/docs/ApiImpact.md @@ -7,7 +7,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **base_metric_v2** | [**ApiBaseMetricV2**](ApiBaseMetricV2.md) | | [optional] **base_metric_v3** | [**ApiBaseMetricV3**](ApiBaseMetricV3.md) | | [optional] -**metric_v40** | [**AdvisoryCVSSV40**](AdvisoryCVSSV40.md) | this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics | [optional] +**metric_v40** | [**AdvisoryCVSSV40**](AdvisoryCVSSV40.md) | | [optional] ## Example diff --git a/docs/ApiUpdate.md b/docs/ApiUpdate.md index 8ff79dc3..fb93536d 100644 --- a/docs/ApiUpdate.md +++ b/docs/ApiUpdate.md @@ -9,7 +9,7 @@ Name | Type | Description | Notes **date_added** | **str** | | [optional] **description** | **str** | | [optional] **id** | **str** | sort // key | [optional] -**issued** | [**ApiDateTime**](ApiDateTime.md) | | [optional] +**issued** | **object** | | [optional] **os_arch** | **str** | | [optional] **os_version** | **str** | | [optional] **packages** | [**List[ApiPackage]**](ApiPackage.md) | | [optional] @@ -17,7 +17,7 @@ Name | Type | Description | Notes **severity** | **str** | | [optional] **title** | **str** | | [optional] **type** | **str** | | [optional] -**updated** | [**ApiDateTime**](ApiDateTime.md) | | [optional] +**updated** | **object** | | [optional] ## Example diff --git a/docs/EndpointsApi.md b/docs/EndpointsApi.md index 2542a7cc..52f55134 100644 --- a/docs/EndpointsApi.md +++ b/docs/EndpointsApi.md @@ -649,7 +649,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **purls_post** -> RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata purls_post(purls) +> RenderResponseWithMetadataV3controllersPurlsResponseDataV3controllersPurlsResponseMetadata purls_post(request_body) Request vulnerabilities related to a list of PURLs @@ -686,11 +686,11 @@ configuration.api_key['Bearer'] = os.environ["API_KEY"] with vulncheck_sdk.ApiClient(configuration) as api_client: # Create an instance of the API class api_instance = vulncheck_sdk.EndpointsApi(api_client) - purls = ['purls_example'] # List[str] | PURL strings used to identify and locate software packages + request_body = ['request_body_example'] # List[str] | PURL strings used to identify and locate software packages try: # Request vulnerabilities related to a list of PURLs - api_response = api_instance.purls_post(purls) + api_response = api_instance.purls_post(request_body) print("The response of EndpointsApi->purls_post:\n") pprint(api_response) except Exception as e: @@ -704,7 +704,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- - **purls** | [**List[str]**](str.md)| PURL strings used to identify and locate software packages | + **request_body** | [**List[str]**](str.md)| PURL strings used to identify and locate software packages | ### Return type @@ -716,7 +716,7 @@ Name | Type | Description | Notes ### HTTP request headers - - **Content-Type**: Not defined + - **Content-Type**: application/json - **Accept**: application/json ### HTTP response details diff --git a/docs/IndicesApi.md b/docs/IndicesApi.md index 8291bbd2..d604c15e 100644 --- a/docs/IndicesApi.md +++ b/docs/IndicesApi.md @@ -494,7 +494,7 @@ Method | HTTP request | Description # **index7zip_get** -> RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination index7zip_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySevenZipPaginatePagination index7zip_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"7zip\" @@ -559,8 +559,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -570,7 +569,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"7zip\" - api_response = api_instance.index7zip_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index7zip_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index7zip_get:\n") pprint(api_response) except Exception as e: @@ -601,8 +600,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -634,7 +632,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_a10_get** -> RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination index_a10_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryA10PaginatePagination index_a10_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"a10\" @@ -699,8 +697,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -710,7 +707,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"a10\" - api_response = api_instance.index_a10_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_a10_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_a10_get:\n") pprint(api_response) except Exception as e: @@ -741,8 +738,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -774,7 +770,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_abb_get** -> RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination index_abb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryABBAdvisoryPaginatePagination index_abb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"abb\" @@ -839,8 +835,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -850,7 +845,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"abb\" - api_response = api_instance.index_abb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_abb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_abb_get:\n") pprint(api_response) except Exception as e: @@ -881,8 +876,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -914,7 +908,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_abbott_get** -> RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination index_abbott_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAbbottPaginatePagination index_abbott_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"abbott\" @@ -979,8 +973,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -990,7 +983,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"abbott\" - api_response = api_instance.index_abbott_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_abbott_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_abbott_get:\n") pprint(api_response) except Exception as e: @@ -1021,8 +1014,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -1054,7 +1046,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_absolute_get** -> RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination index_absolute_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAbsolutePaginatePagination index_absolute_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"absolute\" @@ -1119,8 +1111,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -1130,7 +1121,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"absolute\" - api_response = api_instance.index_absolute_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_absolute_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_absolute_get:\n") pprint(api_response) except Exception as e: @@ -1161,8 +1152,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -1194,7 +1184,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_acronis_get** -> RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination index_acronis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAcronisPaginatePagination index_acronis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"acronis\" @@ -1259,8 +1249,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -1270,7 +1259,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"acronis\" - api_response = api_instance.index_acronis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_acronis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_acronis_get:\n") pprint(api_response) except Exception as e: @@ -1301,8 +1290,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -1334,7 +1322,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_adobe_get** -> RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination index_adobe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAdobeAdvisoryPaginatePagination index_adobe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"adobe\" @@ -1399,8 +1387,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -1410,7 +1397,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"adobe\" - api_response = api_instance.index_adobe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_adobe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_adobe_get:\n") pprint(api_response) except Exception as e: @@ -1441,8 +1428,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -1474,7 +1460,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_advantech_get** -> RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination index_advantech_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAdvantechPaginatePagination index_advantech_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"advantech\" @@ -1539,8 +1525,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -1550,7 +1535,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"advantech\" - api_response = api_instance.index_advantech_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_advantech_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_advantech_get:\n") pprint(api_response) except Exception as e: @@ -1581,8 +1566,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -1614,7 +1598,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_advisories_get** -> RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination index_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAdvisoryRecordPaginatePagination index_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"advisories\" @@ -1679,8 +1663,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -1690,7 +1673,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"advisories\" - api_response = api_instance.index_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_advisories_get:\n") pprint(api_response) except Exception as e: @@ -1721,8 +1704,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -1754,7 +1736,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_aix_get** -> RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination index_aix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAIXPaginatePagination index_aix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"aix\" @@ -1819,8 +1801,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -1830,7 +1811,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"aix\" - api_response = api_instance.index_aix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_aix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_aix_get:\n") pprint(api_response) except Exception as e: @@ -1861,8 +1842,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -1894,7 +1874,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_aleph_research_get** -> RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination index_aleph_research_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAlephResearchPaginatePagination index_aleph_research_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"aleph-research\" @@ -1959,8 +1939,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -1970,7 +1949,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"aleph-research\" - api_response = api_instance.index_aleph_research_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_aleph_research_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_aleph_research_get:\n") pprint(api_response) except Exception as e: @@ -2001,8 +1980,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -2034,7 +2012,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_alibaba_advs_get** -> RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination index_alibaba_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAlibabaPaginatePagination index_alibaba_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"alibaba-advs\" @@ -2099,8 +2077,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -2110,7 +2087,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"alibaba-advs\" - api_response = api_instance.index_alibaba_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_alibaba_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_alibaba_advs_get:\n") pprint(api_response) except Exception as e: @@ -2141,8 +2118,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -2174,7 +2150,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_alma_get** -> RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination index_alma_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAlmaLinuxUpdatePaginatePagination index_alma_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"alma\" @@ -2239,8 +2215,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -2250,7 +2225,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"alma\" - api_response = api_instance.index_alma_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_alma_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_alma_get:\n") pprint(api_response) except Exception as e: @@ -2281,8 +2256,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -2314,7 +2288,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_alpine_get** -> RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination index_alpine_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAlpineLinuxSecDBPaginatePagination index_alpine_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"alpine\" @@ -2379,8 +2353,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -2390,7 +2363,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"alpine\" - api_response = api_instance.index_alpine_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_alpine_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_alpine_get:\n") pprint(api_response) except Exception as e: @@ -2421,8 +2394,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -2454,7 +2426,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_alpine_purls_get** -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination index_alpine_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination index_alpine_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"alpine-purls\" @@ -2519,8 +2491,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -2530,7 +2501,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"alpine-purls\" - api_response = api_instance.index_alpine_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_alpine_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_alpine_purls_get:\n") pprint(api_response) except Exception as e: @@ -2561,8 +2532,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -2594,7 +2564,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_amazon_cve_get** -> RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination index_amazon_cve_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAmazonCVEPaginatePagination index_amazon_cve_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"amazon-cve\" @@ -2659,8 +2629,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -2670,7 +2639,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"amazon-cve\" - api_response = api_instance.index_amazon_cve_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_amazon_cve_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_amazon_cve_get:\n") pprint(api_response) except Exception as e: @@ -2701,8 +2670,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -2734,7 +2702,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_amazon_get** -> RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination index_amazon_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination index_amazon_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"amazon\" @@ -2799,8 +2767,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -2810,7 +2777,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"amazon\" - api_response = api_instance.index_amazon_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_amazon_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_amazon_get:\n") pprint(api_response) except Exception as e: @@ -2841,8 +2808,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -2874,7 +2840,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_amd_get** -> RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination index_amd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAMDPaginatePagination index_amd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"amd\" @@ -2939,8 +2905,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -2950,7 +2915,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"amd\" - api_response = api_instance.index_amd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_amd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_amd_get:\n") pprint(api_response) except Exception as e: @@ -2981,8 +2946,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -3014,7 +2978,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ami_get** -> RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination index_ami_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAMIPaginatePagination index_ami_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ami\" @@ -3079,8 +3043,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -3090,7 +3053,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ami\" - api_response = api_instance.index_ami_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ami_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ami_get:\n") pprint(api_response) except Exception as e: @@ -3121,8 +3084,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -3154,7 +3116,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_anchore_nvd_override_get** -> RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination index_anchore_nvd_override_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAnchoreNVDOverridePaginatePagination index_anchore_nvd_override_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"anchore-nvd-override\" @@ -3219,8 +3181,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -3230,7 +3191,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"anchore-nvd-override\" - api_response = api_instance.index_anchore_nvd_override_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_anchore_nvd_override_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_anchore_nvd_override_get:\n") pprint(api_response) except Exception as e: @@ -3261,8 +3222,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -3294,7 +3254,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_android_get** -> RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination index_android_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAndroidAdvisoryPaginatePagination index_android_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"android\" @@ -3359,8 +3319,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -3370,7 +3329,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"android\" - api_response = api_instance.index_android_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_android_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_android_get:\n") pprint(api_response) except Exception as e: @@ -3401,8 +3360,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -3434,7 +3392,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_activemq_get** -> RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination index_apache_activemq_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheActiveMQPaginatePagination index_apache_activemq_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-activemq\" @@ -3499,8 +3457,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -3510,7 +3467,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-activemq\" - api_response = api_instance.index_apache_activemq_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_activemq_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_activemq_get:\n") pprint(api_response) except Exception as e: @@ -3541,8 +3498,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -3574,7 +3530,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_archiva_get** -> RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination index_apache_archiva_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheArchivaPaginatePagination index_apache_archiva_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-archiva\" @@ -3639,8 +3595,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -3650,7 +3605,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-archiva\" - api_response = api_instance.index_apache_archiva_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_archiva_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_archiva_get:\n") pprint(api_response) except Exception as e: @@ -3681,8 +3636,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -3714,7 +3668,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_arrow_get** -> RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination index_apache_arrow_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheArrowPaginatePagination index_apache_arrow_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-arrow\" @@ -3779,8 +3733,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -3790,7 +3743,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-arrow\" - api_response = api_instance.index_apache_arrow_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_arrow_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_arrow_get:\n") pprint(api_response) except Exception as e: @@ -3821,8 +3774,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -3854,7 +3806,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_camel_get** -> RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination index_apache_camel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheCamelPaginatePagination index_apache_camel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-camel\" @@ -3919,8 +3871,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -3930,7 +3881,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-camel\" - api_response = api_instance.index_apache_camel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_camel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_camel_get:\n") pprint(api_response) except Exception as e: @@ -3961,8 +3912,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -3994,7 +3944,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_commons_get** -> RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination index_apache_commons_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheCommonsPaginatePagination index_apache_commons_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-commons\" @@ -4059,8 +4009,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -4070,7 +4019,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-commons\" - api_response = api_instance.index_apache_commons_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_commons_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_commons_get:\n") pprint(api_response) except Exception as e: @@ -4101,8 +4050,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -4134,7 +4082,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_couchdb_get** -> RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination index_apache_couchdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheCouchDBPaginatePagination index_apache_couchdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-couchdb\" @@ -4199,8 +4147,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -4210,7 +4157,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-couchdb\" - api_response = api_instance.index_apache_couchdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_couchdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_couchdb_get:\n") pprint(api_response) except Exception as e: @@ -4241,8 +4188,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -4274,7 +4220,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_flink_get** -> RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination index_apache_flink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheFlinkPaginatePagination index_apache_flink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-flink\" @@ -4339,8 +4285,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -4350,7 +4295,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-flink\" - api_response = api_instance.index_apache_flink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_flink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_flink_get:\n") pprint(api_response) except Exception as e: @@ -4381,8 +4326,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -4414,7 +4358,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_guacamole_get** -> RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination index_apache_guacamole_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheGuacamolePaginatePagination index_apache_guacamole_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-guacamole\" @@ -4479,8 +4423,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -4490,7 +4433,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-guacamole\" - api_response = api_instance.index_apache_guacamole_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_guacamole_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_guacamole_get:\n") pprint(api_response) except Exception as e: @@ -4521,8 +4464,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -4554,7 +4496,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_hadoop_get** -> RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination index_apache_hadoop_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheHadoopPaginatePagination index_apache_hadoop_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-hadoop\" @@ -4619,8 +4561,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -4630,7 +4571,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-hadoop\" - api_response = api_instance.index_apache_hadoop_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_hadoop_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_hadoop_get:\n") pprint(api_response) except Exception as e: @@ -4661,8 +4602,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -4694,7 +4634,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_http_get** -> RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination index_apache_http_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheHTTPPaginatePagination index_apache_http_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-http\" @@ -4759,8 +4699,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -4770,7 +4709,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-http\" - api_response = api_instance.index_apache_http_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_http_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_http_get:\n") pprint(api_response) except Exception as e: @@ -4801,8 +4740,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -4834,7 +4772,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_jspwiki_get** -> RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination index_apache_jspwiki_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheJSPWikiPaginatePagination index_apache_jspwiki_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-jspwiki\" @@ -4899,8 +4837,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -4910,7 +4847,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-jspwiki\" - api_response = api_instance.index_apache_jspwiki_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_jspwiki_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_jspwiki_get:\n") pprint(api_response) except Exception as e: @@ -4941,8 +4878,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -4974,7 +4910,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_kafka_get** -> RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination index_apache_kafka_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheKafkaPaginatePagination index_apache_kafka_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-kafka\" @@ -5039,8 +4975,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -5050,7 +4985,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-kafka\" - api_response = api_instance.index_apache_kafka_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_kafka_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_kafka_get:\n") pprint(api_response) except Exception as e: @@ -5081,8 +5016,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -5114,7 +5048,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_loggingservices_get** -> RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination index_apache_loggingservices_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheLoggingServicesPaginatePagination index_apache_loggingservices_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-loggingservices\" @@ -5179,8 +5113,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -5190,7 +5123,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-loggingservices\" - api_response = api_instance.index_apache_loggingservices_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_loggingservices_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_loggingservices_get:\n") pprint(api_response) except Exception as e: @@ -5221,8 +5154,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -5254,7 +5186,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_nifi_get** -> RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination index_apache_nifi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheNiFiPaginatePagination index_apache_nifi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-nifi\" @@ -5319,8 +5251,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -5330,7 +5261,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-nifi\" - api_response = api_instance.index_apache_nifi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_nifi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_nifi_get:\n") pprint(api_response) except Exception as e: @@ -5361,8 +5292,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -5394,7 +5324,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_ofbiz_get** -> RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination index_apache_ofbiz_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheOFBizPaginatePagination index_apache_ofbiz_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-ofbiz\" @@ -5459,8 +5389,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -5470,7 +5399,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-ofbiz\" - api_response = api_instance.index_apache_ofbiz_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_ofbiz_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_ofbiz_get:\n") pprint(api_response) except Exception as e: @@ -5501,8 +5430,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -5534,7 +5462,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_openmeetings_get** -> RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination index_apache_openmeetings_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheOpenMeetingsPaginatePagination index_apache_openmeetings_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-openmeetings\" @@ -5599,8 +5527,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -5610,7 +5537,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-openmeetings\" - api_response = api_instance.index_apache_openmeetings_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_openmeetings_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_openmeetings_get:\n") pprint(api_response) except Exception as e: @@ -5641,8 +5568,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -5674,7 +5600,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_openoffice_get** -> RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination index_apache_openoffice_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheOpenOfficePaginatePagination index_apache_openoffice_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-openoffice\" @@ -5739,8 +5665,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -5750,7 +5675,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-openoffice\" - api_response = api_instance.index_apache_openoffice_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_openoffice_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_openoffice_get:\n") pprint(api_response) except Exception as e: @@ -5781,8 +5706,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -5814,7 +5738,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_pulsar_get** -> RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination index_apache_pulsar_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApachePulsarPaginatePagination index_apache_pulsar_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-pulsar\" @@ -5879,8 +5803,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -5890,7 +5813,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-pulsar\" - api_response = api_instance.index_apache_pulsar_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_pulsar_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_pulsar_get:\n") pprint(api_response) except Exception as e: @@ -5921,8 +5844,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -5954,7 +5876,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_shiro_get** -> RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination index_apache_shiro_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheShiroPaginatePagination index_apache_shiro_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-shiro\" @@ -6019,8 +5941,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -6030,7 +5951,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-shiro\" - api_response = api_instance.index_apache_shiro_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_shiro_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_shiro_get:\n") pprint(api_response) except Exception as e: @@ -6061,8 +5982,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -6094,7 +6014,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_spark_get** -> RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination index_apache_spark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheSparkPaginatePagination index_apache_spark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-spark\" @@ -6159,8 +6079,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -6170,7 +6089,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-spark\" - api_response = api_instance.index_apache_spark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_spark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_spark_get:\n") pprint(api_response) except Exception as e: @@ -6201,8 +6120,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -6234,7 +6152,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_struts_get** -> RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination index_apache_struts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheStrutsPaginatePagination index_apache_struts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-struts\" @@ -6299,8 +6217,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -6310,7 +6227,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-struts\" - api_response = api_instance.index_apache_struts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_struts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_struts_get:\n") pprint(api_response) except Exception as e: @@ -6341,8 +6258,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -6374,7 +6290,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_subversion_get** -> RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination index_apache_subversion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheSubversionPaginatePagination index_apache_subversion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-subversion\" @@ -6439,8 +6355,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -6450,7 +6365,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-subversion\" - api_response = api_instance.index_apache_subversion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_subversion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_subversion_get:\n") pprint(api_response) except Exception as e: @@ -6481,8 +6396,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -6514,7 +6428,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_superset_get** -> RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination index_apache_superset_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheSupersetPaginatePagination index_apache_superset_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-superset\" @@ -6579,8 +6493,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -6590,7 +6503,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-superset\" - api_response = api_instance.index_apache_superset_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_superset_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_superset_get:\n") pprint(api_response) except Exception as e: @@ -6621,8 +6534,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -6654,7 +6566,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_tomcat_get** -> RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination index_apache_tomcat_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheTomcatPaginatePagination index_apache_tomcat_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-tomcat\" @@ -6719,8 +6631,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -6730,7 +6641,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-tomcat\" - api_response = api_instance.index_apache_tomcat_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_tomcat_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_tomcat_get:\n") pprint(api_response) except Exception as e: @@ -6761,8 +6672,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -6794,7 +6704,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apache_zookeeper_get** -> RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination index_apache_zookeeper_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryApacheZooKeeperPaginatePagination index_apache_zookeeper_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apache-zookeeper\" @@ -6859,8 +6769,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -6870,7 +6779,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apache-zookeeper\" - api_response = api_instance.index_apache_zookeeper_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apache_zookeeper_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apache_zookeeper_get:\n") pprint(api_response) except Exception as e: @@ -6901,8 +6810,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -6934,7 +6842,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_appcheck_get** -> RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination index_appcheck_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAppCheckPaginatePagination index_appcheck_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"appcheck\" @@ -6999,8 +6907,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -7010,7 +6917,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"appcheck\" - api_response = api_instance.index_appcheck_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_appcheck_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_appcheck_get:\n") pprint(api_response) except Exception as e: @@ -7041,8 +6948,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -7074,7 +6980,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_appgate_get** -> RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination index_appgate_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAppgatePaginatePagination index_appgate_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"appgate\" @@ -7139,8 +7045,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -7150,7 +7055,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"appgate\" - api_response = api_instance.index_appgate_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_appgate_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_appgate_get:\n") pprint(api_response) except Exception as e: @@ -7181,8 +7086,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -7214,7 +7118,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_apple_get** -> RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination index_apple_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAppleAdvisoryPaginatePagination index_apple_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"apple\" @@ -7279,8 +7183,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -7290,7 +7193,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"apple\" - api_response = api_instance.index_apple_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_apple_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_apple_get:\n") pprint(api_response) except Exception as e: @@ -7321,8 +7224,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -7354,7 +7256,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_arch_get** -> RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination index_arch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryArchIssuePaginatePagination index_arch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"arch\" @@ -7419,8 +7321,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -7430,7 +7331,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"arch\" - api_response = api_instance.index_arch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_arch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_arch_get:\n") pprint(api_response) except Exception as e: @@ -7461,8 +7362,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -7494,7 +7394,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_arista_get** -> RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination index_arista_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAristaPaginatePagination index_arista_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"arista\" @@ -7559,8 +7459,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -7570,7 +7469,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"arista\" - api_response = api_instance.index_arista_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_arista_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_arista_get:\n") pprint(api_response) except Exception as e: @@ -7601,8 +7500,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -7634,7 +7532,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_aruba_get** -> RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination index_aruba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryArubaPaginatePagination index_aruba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"aruba\" @@ -7699,8 +7597,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -7710,7 +7607,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"aruba\" - api_response = api_instance.index_aruba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_aruba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_aruba_get:\n") pprint(api_response) except Exception as e: @@ -7741,8 +7638,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -7774,7 +7670,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_asrg_get** -> RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination index_asrg_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryASRGPaginatePagination index_asrg_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"asrg\" @@ -7839,8 +7735,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -7850,7 +7745,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"asrg\" - api_response = api_instance.index_asrg_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_asrg_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_asrg_get:\n") pprint(api_response) except Exception as e: @@ -7881,8 +7776,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -7914,7 +7808,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_assetnote_get** -> RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination index_assetnote_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAssetNotePaginatePagination index_assetnote_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"assetnote\" @@ -7979,8 +7873,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -7990,7 +7883,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"assetnote\" - api_response = api_instance.index_assetnote_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_assetnote_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_assetnote_get:\n") pprint(api_response) except Exception as e: @@ -8021,8 +7914,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -8054,7 +7946,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_asterisk_get** -> RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination index_asterisk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAsteriskPaginatePagination index_asterisk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"asterisk\" @@ -8119,8 +8011,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -8130,7 +8021,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"asterisk\" - api_response = api_instance.index_asterisk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_asterisk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_asterisk_get:\n") pprint(api_response) except Exception as e: @@ -8161,8 +8052,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -8194,7 +8084,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_astra_get** -> RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination index_astra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAstraPaginatePagination index_astra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"astra\" @@ -8259,8 +8149,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -8270,7 +8159,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"astra\" - api_response = api_instance.index_astra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_astra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_astra_get:\n") pprint(api_response) except Exception as e: @@ -8301,8 +8190,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -8334,7 +8222,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_asus_get** -> RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination index_asus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAsusPaginatePagination index_asus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"asus\" @@ -8399,8 +8287,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -8410,7 +8297,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"asus\" - api_response = api_instance.index_asus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_asus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_asus_get:\n") pprint(api_response) except Exception as e: @@ -8441,8 +8328,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -8474,7 +8360,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_atlassian_get** -> RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination index_atlassian_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAtlassianAdvisoryPaginatePagination index_atlassian_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"atlassian\" @@ -8539,8 +8425,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -8550,7 +8435,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"atlassian\" - api_response = api_instance.index_atlassian_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_atlassian_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_atlassian_get:\n") pprint(api_response) except Exception as e: @@ -8581,8 +8466,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -8614,7 +8498,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_atlassian_vulns_get** -> RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination index_atlassian_vulns_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAtlassianVulnPaginatePagination index_atlassian_vulns_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"atlassian-vulns\" @@ -8679,8 +8563,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -8690,7 +8573,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"atlassian-vulns\" - api_response = api_instance.index_atlassian_vulns_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_atlassian_vulns_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_atlassian_vulns_get:\n") pprint(api_response) except Exception as e: @@ -8721,8 +8604,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -8754,7 +8636,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_atredis_get** -> RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination index_atredis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAtredisPaginatePagination index_atredis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"atredis\" @@ -8819,8 +8701,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -8830,7 +8711,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"atredis\" - api_response = api_instance.index_atredis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_atredis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_atredis_get:\n") pprint(api_response) except Exception as e: @@ -8861,8 +8742,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -8894,7 +8774,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_audiocodes_get** -> RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination index_audiocodes_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAudiocodesPaginatePagination index_audiocodes_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"audiocodes\" @@ -8959,8 +8839,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -8970,7 +8849,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"audiocodes\" - api_response = api_instance.index_audiocodes_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_audiocodes_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_audiocodes_get:\n") pprint(api_response) except Exception as e: @@ -9001,8 +8880,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -9034,7 +8912,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_auscert_get** -> RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination index_auscert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAusCertPaginatePagination index_auscert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"auscert\" @@ -9099,8 +8977,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -9110,7 +8987,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"auscert\" - api_response = api_instance.index_auscert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_auscert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_auscert_get:\n") pprint(api_response) except Exception as e: @@ -9141,8 +9018,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -9174,7 +9050,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_autodesk_get** -> RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination index_autodesk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAutodeskPaginatePagination index_autodesk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"autodesk\" @@ -9239,8 +9115,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -9250,7 +9125,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"autodesk\" - api_response = api_instance.index_autodesk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_autodesk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_autodesk_get:\n") pprint(api_response) except Exception as e: @@ -9281,8 +9156,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -9314,7 +9188,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_avaya_get** -> RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination index_avaya_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAvayaPaginatePagination index_avaya_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"avaya\" @@ -9379,8 +9253,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -9390,7 +9263,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"avaya\" - api_response = api_instance.index_avaya_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_avaya_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_avaya_get:\n") pprint(api_response) except Exception as e: @@ -9421,8 +9294,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -9454,7 +9326,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_aveva_get** -> RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination index_aveva_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAVEVAAdvisoryPaginatePagination index_aveva_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"aveva\" @@ -9519,8 +9391,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -9530,7 +9401,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"aveva\" - api_response = api_instance.index_aveva_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_aveva_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_aveva_get:\n") pprint(api_response) except Exception as e: @@ -9561,8 +9432,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -9594,7 +9464,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_avidml_advs_get** -> RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination index_avidml_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAVIDMLAdvsPaginatePagination index_avidml_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"avidml-advs\" @@ -9659,8 +9529,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -9670,7 +9539,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"avidml-advs\" - api_response = api_instance.index_avidml_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_avidml_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_avidml_advs_get:\n") pprint(api_response) except Exception as e: @@ -9701,8 +9570,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -9734,7 +9602,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_avigilon_get** -> RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination index_avigilon_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAvigilonPaginatePagination index_avigilon_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"avigilon\" @@ -9799,8 +9667,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -9810,7 +9677,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"avigilon\" - api_response = api_instance.index_avigilon_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_avigilon_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_avigilon_get:\n") pprint(api_response) except Exception as e: @@ -9841,8 +9708,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -9874,7 +9740,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_aws_get** -> RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination index_aws_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAWSPaginatePagination index_aws_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"aws\" @@ -9939,8 +9805,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -9950,7 +9815,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"aws\" - api_response = api_instance.index_aws_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_aws_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_aws_get:\n") pprint(api_response) except Exception as e: @@ -9981,8 +9846,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -10014,7 +9878,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_axis_get** -> RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination index_axis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAxisPaginatePagination index_axis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"axis\" @@ -10079,8 +9943,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -10090,7 +9953,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"axis\" - api_response = api_instance.index_axis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_axis_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_axis_get:\n") pprint(api_response) except Exception as e: @@ -10121,8 +9984,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -10154,7 +10016,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_azul_get** -> RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination index_azul_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAzulPaginatePagination index_azul_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"azul\" @@ -10219,8 +10081,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -10230,7 +10091,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"azul\" - api_response = api_instance.index_azul_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_azul_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_azul_get:\n") pprint(api_response) except Exception as e: @@ -10261,8 +10122,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -10294,7 +10154,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_bandr_get** -> RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination index_bandr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBandrPaginatePagination index_bandr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"bandr\" @@ -10359,8 +10219,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -10370,7 +10229,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"bandr\" - api_response = api_instance.index_bandr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_bandr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_bandr_get:\n") pprint(api_response) except Exception as e: @@ -10401,8 +10260,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -10434,7 +10292,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_baxter_get** -> RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination index_baxter_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBaxterAdvisoryPaginatePagination index_baxter_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"baxter\" @@ -10499,8 +10357,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -10510,7 +10367,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"baxter\" - api_response = api_instance.index_baxter_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_baxter_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_baxter_get:\n") pprint(api_response) except Exception as e: @@ -10541,8 +10398,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -10574,7 +10430,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_bbraun_get** -> RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination index_bbraun_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBBraunAdvisoryPaginatePagination index_bbraun_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"bbraun\" @@ -10639,8 +10495,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -10650,7 +10505,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"bbraun\" - api_response = api_instance.index_bbraun_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_bbraun_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_bbraun_get:\n") pprint(api_response) except Exception as e: @@ -10681,8 +10536,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -10714,7 +10568,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_bd_get** -> RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination index_bd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBectonDickinsonAdvisoryPaginatePagination index_bd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"bd\" @@ -10779,8 +10633,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -10790,7 +10643,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"bd\" - api_response = api_instance.index_bd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_bd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_bd_get:\n") pprint(api_response) except Exception as e: @@ -10821,8 +10674,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -10854,7 +10706,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_bdu_get** -> RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination index_bdu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBDUAdvisoryPaginatePagination index_bdu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"bdu\" @@ -10919,8 +10771,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -10930,7 +10781,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"bdu\" - api_response = api_instance.index_bdu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_bdu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_bdu_get:\n") pprint(api_response) except Exception as e: @@ -10961,8 +10812,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -10994,7 +10844,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_beckhoff_get** -> RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination index_beckhoff_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBeckhoffAdvisoryPaginatePagination index_beckhoff_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"beckhoff\" @@ -11059,8 +10909,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -11070,7 +10919,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"beckhoff\" - api_response = api_instance.index_beckhoff_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_beckhoff_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_beckhoff_get:\n") pprint(api_response) except Exception as e: @@ -11101,8 +10950,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -11134,7 +10982,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_beckman_coulter_get** -> RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination index_beckman_coulter_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBeckmanCoulterPaginatePagination index_beckman_coulter_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"beckman-coulter\" @@ -11199,8 +11047,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -11210,7 +11057,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"beckman-coulter\" - api_response = api_instance.index_beckman_coulter_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_beckman_coulter_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_beckman_coulter_get:\n") pprint(api_response) except Exception as e: @@ -11241,8 +11088,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -11274,7 +11120,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_belden_get** -> RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination index_belden_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBeldenAdvisoryPaginatePagination index_belden_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"belden\" @@ -11339,8 +11185,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -11350,7 +11195,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"belden\" - api_response = api_instance.index_belden_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_belden_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_belden_get:\n") pprint(api_response) except Exception as e: @@ -11381,8 +11226,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -11414,7 +11258,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_beyond_trust_get** -> RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination index_beyond_trust_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBeyondTrustPaginatePagination index_beyond_trust_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"beyond-trust\" @@ -11479,8 +11323,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -11490,7 +11333,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"beyond-trust\" - api_response = api_instance.index_beyond_trust_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_beyond_trust_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_beyond_trust_get:\n") pprint(api_response) except Exception as e: @@ -11521,8 +11364,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -11554,7 +11396,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_binarly_get** -> RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination index_binarly_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBinarlyPaginatePagination index_binarly_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"binarly\" @@ -11619,8 +11461,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -11630,7 +11471,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"binarly\" - api_response = api_instance.index_binarly_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_binarly_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_binarly_get:\n") pprint(api_response) except Exception as e: @@ -11661,8 +11502,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -11694,7 +11534,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_bitdefender_get** -> RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination index_bitdefender_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBitDefenderPaginatePagination index_bitdefender_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"bitdefender\" @@ -11759,8 +11599,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -11770,7 +11609,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"bitdefender\" - api_response = api_instance.index_bitdefender_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_bitdefender_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_bitdefender_get:\n") pprint(api_response) except Exception as e: @@ -11801,8 +11640,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -11834,7 +11672,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_blackberry_get** -> RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination index_blackberry_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBlackBerryPaginatePagination index_blackberry_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"blackberry\" @@ -11899,8 +11737,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -11910,7 +11747,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"blackberry\" - api_response = api_instance.index_blackberry_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_blackberry_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_blackberry_get:\n") pprint(api_response) except Exception as e: @@ -11941,8 +11778,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -11974,7 +11810,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_bls_get** -> RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination index_bls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBLSPaginatePagination index_bls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"bls\" @@ -12039,8 +11875,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -12050,7 +11885,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"bls\" - api_response = api_instance.index_bls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_bls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_bls_get:\n") pprint(api_response) except Exception as e: @@ -12081,8 +11916,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -12114,7 +11948,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_bosch_get** -> RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination index_bosch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBoschAdvisoryPaginatePagination index_bosch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"bosch\" @@ -12179,8 +12013,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -12190,7 +12023,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"bosch\" - api_response = api_instance.index_bosch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_bosch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_bosch_get:\n") pprint(api_response) except Exception as e: @@ -12221,8 +12054,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -12254,7 +12086,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_boston_scientific_get** -> RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination index_boston_scientific_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBostonScientificAdvisoryPaginatePagination index_boston_scientific_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"boston-scientific\" @@ -12319,8 +12151,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -12330,7 +12161,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"boston-scientific\" - api_response = api_instance.index_boston_scientific_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_boston_scientific_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_boston_scientific_get:\n") pprint(api_response) except Exception as e: @@ -12361,8 +12192,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -12394,7 +12224,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_botnets_get** -> RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination index_botnets_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryBotnetPaginatePagination index_botnets_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"botnets\" @@ -12459,8 +12289,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -12470,7 +12299,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"botnets\" - api_response = api_instance.index_botnets_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_botnets_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_botnets_get:\n") pprint(api_response) except Exception as e: @@ -12501,8 +12330,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -12534,7 +12362,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ca_cyber_centre_get** -> RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination index_ca_cyber_centre_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCACyberCentreAdvisoryPaginatePagination index_ca_cyber_centre_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ca-cyber-centre\" @@ -12599,8 +12427,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -12610,7 +12437,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ca-cyber-centre\" - api_response = api_instance.index_ca_cyber_centre_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ca_cyber_centre_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ca_cyber_centre_get:\n") pprint(api_response) except Exception as e: @@ -12641,8 +12468,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -12674,7 +12500,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_canvas_get** -> RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination index_canvas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCanvasExploitPaginatePagination index_canvas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"canvas\" @@ -12739,8 +12565,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -12750,7 +12575,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"canvas\" - api_response = api_instance.index_canvas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_canvas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_canvas_get:\n") pprint(api_response) except Exception as e: @@ -12781,8 +12606,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -12814,7 +12638,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_carestream_get** -> RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination index_carestream_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCarestreamAdvisoryPaginatePagination index_carestream_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"carestream\" @@ -12879,8 +12703,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -12890,7 +12713,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"carestream\" - api_response = api_instance.index_carestream_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_carestream_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_carestream_get:\n") pprint(api_response) except Exception as e: @@ -12921,8 +12744,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -12954,7 +12776,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cargo_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_cargo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_cargo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cargo\" @@ -13019,8 +12841,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -13030,7 +12851,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cargo\" - api_response = api_instance.index_cargo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cargo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cargo_get:\n") pprint(api_response) except Exception as e: @@ -13061,8 +12882,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -13094,7 +12914,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_carrier_get** -> RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination index_carrier_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCarrierPaginatePagination index_carrier_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"carrier\" @@ -13159,8 +12979,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -13170,7 +12989,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"carrier\" - api_response = api_instance.index_carrier_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_carrier_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_carrier_get:\n") pprint(api_response) except Exception as e: @@ -13201,8 +13020,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -13234,7 +13052,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cbl_mariner_get** -> RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination index_cbl_mariner_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCBLMarinerPaginatePagination index_cbl_mariner_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cbl-mariner\" @@ -13299,8 +13117,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -13310,7 +13127,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cbl-mariner\" - api_response = api_instance.index_cbl_mariner_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cbl_mariner_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cbl_mariner_get:\n") pprint(api_response) except Exception as e: @@ -13341,8 +13158,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -13374,7 +13190,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_centos_get** -> RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination index_centos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCESAPaginatePagination index_centos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"centos\" @@ -13439,8 +13255,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -13450,7 +13265,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"centos\" - api_response = api_instance.index_centos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_centos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_centos_get:\n") pprint(api_response) except Exception as e: @@ -13481,8 +13296,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -13514,7 +13328,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cert_be_get** -> RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination index_cert_be_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCertBEPaginatePagination index_cert_be_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cert-be\" @@ -13579,8 +13393,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -13590,7 +13403,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cert-be\" - api_response = api_instance.index_cert_be_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cert_be_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cert_be_get:\n") pprint(api_response) except Exception as e: @@ -13621,8 +13434,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -13654,7 +13466,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cert_in_get** -> RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination index_cert_in_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCertINPaginatePagination index_cert_in_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cert-in\" @@ -13719,8 +13531,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -13730,7 +13541,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cert-in\" - api_response = api_instance.index_cert_in_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cert_in_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cert_in_get:\n") pprint(api_response) except Exception as e: @@ -13761,8 +13572,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -13794,7 +13604,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cert_ir_security_alerts_get** -> RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination index_cert_ir_security_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCertIRSecurityAlertPaginatePagination index_cert_ir_security_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cert-ir-security-alerts\" @@ -13859,8 +13669,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -13870,7 +13679,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cert-ir-security-alerts\" - api_response = api_instance.index_cert_ir_security_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cert_ir_security_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cert_ir_security_alerts_get:\n") pprint(api_response) except Exception as e: @@ -13901,8 +13710,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -13934,7 +13742,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cert_se_get** -> RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination index_cert_se_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCertSEPaginatePagination index_cert_se_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cert-se\" @@ -13999,8 +13807,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -14010,7 +13817,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cert-se\" - api_response = api_instance.index_cert_se_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cert_se_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cert_se_get:\n") pprint(api_response) except Exception as e: @@ -14041,8 +13848,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -14074,7 +13880,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cert_ua_get** -> RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination index_cert_ua_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCertUAPaginatePagination index_cert_ua_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cert-ua\" @@ -14139,8 +13945,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -14150,7 +13955,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cert-ua\" - api_response = api_instance.index_cert_ua_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cert_ua_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cert_ua_get:\n") pprint(api_response) except Exception as e: @@ -14181,8 +13986,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -14214,7 +14018,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_certeu_get** -> RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination index_certeu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCERTEUAdvisoryPaginatePagination index_certeu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"certeu\" @@ -14279,8 +14083,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -14290,7 +14093,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"certeu\" - api_response = api_instance.index_certeu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_certeu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_certeu_get:\n") pprint(api_response) except Exception as e: @@ -14321,8 +14124,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -14354,7 +14156,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_certfr_get** -> RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination index_certfr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCertFRAdvisoryPaginatePagination index_certfr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"certfr\" @@ -14419,8 +14221,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -14430,7 +14231,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"certfr\" - api_response = api_instance.index_certfr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_certfr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_certfr_get:\n") pprint(api_response) except Exception as e: @@ -14461,8 +14262,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -14494,7 +14294,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_chainguard_get** -> RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination index_chainguard_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryChainGuardPaginatePagination index_chainguard_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"chainguard\" @@ -14559,8 +14359,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -14570,7 +14369,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"chainguard\" - api_response = api_instance.index_chainguard_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_chainguard_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_chainguard_get:\n") pprint(api_response) except Exception as e: @@ -14601,8 +14400,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -14634,7 +14432,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_checkpoint_get** -> RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination index_checkpoint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCheckPointPaginatePagination index_checkpoint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"checkpoint\" @@ -14699,8 +14497,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -14710,7 +14507,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"checkpoint\" - api_response = api_instance.index_checkpoint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_checkpoint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_checkpoint_get:\n") pprint(api_response) except Exception as e: @@ -14741,8 +14538,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -14774,7 +14570,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_chrome_get** -> RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination index_chrome_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryChromePaginatePagination index_chrome_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"chrome\" @@ -14839,8 +14635,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -14850,7 +14645,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"chrome\" - api_response = api_instance.index_chrome_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_chrome_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_chrome_get:\n") pprint(api_response) except Exception as e: @@ -14881,8 +14676,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -14914,7 +14708,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ciena_get** -> RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination index_ciena_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCienaPaginatePagination index_ciena_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ciena\" @@ -14979,8 +14773,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -14990,7 +14783,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ciena\" - api_response = api_instance.index_ciena_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ciena_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ciena_get:\n") pprint(api_response) except Exception as e: @@ -15021,8 +14814,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -15054,7 +14846,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cisa_alerts_get** -> RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination index_cisa_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCISAAlertPaginatePagination index_cisa_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cisa-alerts\" @@ -15119,8 +14911,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -15130,7 +14921,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cisa-alerts\" - api_response = api_instance.index_cisa_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cisa_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cisa_alerts_get:\n") pprint(api_response) except Exception as e: @@ -15161,8 +14952,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -15194,7 +14984,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cisa_csaf_get** -> RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination index_cisa_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCisaCsafAdvPaginatePagination index_cisa_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cisa-csaf\" @@ -15259,8 +15049,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -15270,7 +15059,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cisa-csaf\" - api_response = api_instance.index_cisa_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cisa_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cisa_csaf_get:\n") pprint(api_response) except Exception as e: @@ -15301,8 +15090,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -15334,7 +15122,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cisa_kev_get** -> RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination index_cisa_kev_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryKEVCatalogVulnerabilityPaginatePagination index_cisa_kev_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cisa-kev\" @@ -15399,8 +15187,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -15410,7 +15197,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cisa-kev\" - api_response = api_instance.index_cisa_kev_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cisa_kev_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cisa_kev_get:\n") pprint(api_response) except Exception as e: @@ -15441,8 +15228,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -15474,7 +15260,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cisco_csaf_get** -> RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination index_cisco_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCiscoCSAFPaginatePagination index_cisco_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cisco-csaf\" @@ -15539,8 +15325,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -15550,7 +15335,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cisco-csaf\" - api_response = api_instance.index_cisco_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cisco_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cisco_csaf_get:\n") pprint(api_response) except Exception as e: @@ -15581,8 +15366,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -15614,7 +15398,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cisco_get** -> RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination index_cisco_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCiscoAdvisoryPaginatePagination index_cisco_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cisco\" @@ -15679,8 +15463,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -15690,7 +15473,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cisco\" - api_response = api_instance.index_cisco_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cisco_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cisco_get:\n") pprint(api_response) except Exception as e: @@ -15721,8 +15504,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -15754,7 +15536,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cisco_known_good_values_get** -> RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination index_cisco_known_good_values_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCiscoKnownGoodValuePaginatePagination index_cisco_known_good_values_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cisco-known-good-values\" @@ -15819,8 +15601,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -15830,7 +15611,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cisco-known-good-values\" - api_response = api_instance.index_cisco_known_good_values_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cisco_known_good_values_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cisco_known_good_values_get:\n") pprint(api_response) except Exception as e: @@ -15861,8 +15642,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -15894,7 +15674,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cisco_talos_get** -> RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination index_cisco_talos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTalosAdvisoryPaginatePagination index_cisco_talos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cisco-talos\" @@ -15959,8 +15739,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -15970,7 +15749,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cisco-talos\" - api_response = api_instance.index_cisco_talos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cisco_talos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cisco_talos_get:\n") pprint(api_response) except Exception as e: @@ -16001,8 +15780,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -16034,7 +15812,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_citrix_get** -> RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination index_citrix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCitrixAdvisoryPaginatePagination index_citrix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"citrix\" @@ -16099,8 +15877,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -16110,7 +15887,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"citrix\" - api_response = api_instance.index_citrix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_citrix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_citrix_get:\n") pprint(api_response) except Exception as e: @@ -16141,8 +15918,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -16174,7 +15950,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_claroty_get** -> RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination index_claroty_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryClarotyVulnerabilityPaginatePagination index_claroty_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"claroty\" @@ -16239,8 +16015,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -16250,7 +16025,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"claroty\" - api_response = api_instance.index_claroty_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_claroty_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_claroty_get:\n") pprint(api_response) except Exception as e: @@ -16281,8 +16056,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -16314,7 +16088,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cloudbees_get** -> RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination index_cloudbees_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCloudBeesPaginatePagination index_cloudbees_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cloudbees\" @@ -16379,8 +16153,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -16390,7 +16163,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cloudbees\" - api_response = api_instance.index_cloudbees_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cloudbees_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cloudbees_get:\n") pprint(api_response) except Exception as e: @@ -16421,8 +16194,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -16454,7 +16226,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cloudvulndb_get** -> RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination index_cloudvulndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCloudVulnDBAdvisoryPaginatePagination index_cloudvulndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cloudvulndb\" @@ -16519,8 +16291,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -16530,7 +16301,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cloudvulndb\" - api_response = api_instance.index_cloudvulndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cloudvulndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cloudvulndb_get:\n") pprint(api_response) except Exception as e: @@ -16561,8 +16332,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -16594,7 +16364,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cnnvd_get** -> RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination index_cnnvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCNNVDEntryJSONPaginatePagination index_cnnvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cnnvd\" @@ -16659,8 +16429,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -16670,7 +16439,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cnnvd\" - api_response = api_instance.index_cnnvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cnnvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cnnvd_get:\n") pprint(api_response) except Exception as e: @@ -16701,8 +16470,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -16734,7 +16502,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cnvd_bulletins_get** -> RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination index_cnvd_bulletins_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCNVDBulletinPaginatePagination index_cnvd_bulletins_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cnvd-bulletins\" @@ -16799,8 +16567,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -16810,7 +16577,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cnvd-bulletins\" - api_response = api_instance.index_cnvd_bulletins_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cnvd_bulletins_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cnvd_bulletins_get:\n") pprint(api_response) except Exception as e: @@ -16841,8 +16608,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -16874,7 +16640,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cnvd_flaws_get** -> RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination index_cnvd_flaws_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCNVDFlawPaginatePagination index_cnvd_flaws_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cnvd-flaws\" @@ -16939,8 +16705,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -16950,7 +16715,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cnvd-flaws\" - api_response = api_instance.index_cnvd_flaws_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cnvd_flaws_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cnvd_flaws_get:\n") pprint(api_response) except Exception as e: @@ -16981,8 +16746,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -17014,7 +16778,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cocoapods_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_cocoapods_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_cocoapods_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cocoapods\" @@ -17079,8 +16843,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -17090,7 +16853,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cocoapods\" - api_response = api_instance.index_cocoapods_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cocoapods_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cocoapods_get:\n") pprint(api_response) except Exception as e: @@ -17121,8 +16884,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -17154,7 +16916,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_codesys_get** -> RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination index_codesys_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCodesysAdvisoryPaginatePagination index_codesys_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"codesys\" @@ -17219,8 +16981,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -17230,7 +16991,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"codesys\" - api_response = api_instance.index_codesys_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_codesys_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_codesys_get:\n") pprint(api_response) except Exception as e: @@ -17261,8 +17022,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -17294,7 +17054,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_commvault_get** -> RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination index_commvault_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCommVaultPaginatePagination index_commvault_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"commvault\" @@ -17359,8 +17119,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -17370,7 +17129,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"commvault\" - api_response = api_instance.index_commvault_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_commvault_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_commvault_get:\n") pprint(api_response) except Exception as e: @@ -17401,8 +17160,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -17434,7 +17192,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_compass_security_get** -> RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination index_compass_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCompassSecurityPaginatePagination index_compass_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"compass-security\" @@ -17499,8 +17257,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -17510,7 +17267,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"compass-security\" - api_response = api_instance.index_compass_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_compass_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_compass_security_get:\n") pprint(api_response) except Exception as e: @@ -17541,8 +17298,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -17574,7 +17330,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_composer_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_composer_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_composer_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"composer\" @@ -17639,8 +17395,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -17650,7 +17405,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"composer\" - api_response = api_instance.index_composer_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_composer_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_composer_get:\n") pprint(api_response) except Exception as e: @@ -17681,8 +17436,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -17714,7 +17468,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_conan_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_conan_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_conan_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"conan\" @@ -17779,8 +17533,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -17790,7 +17543,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"conan\" - api_response = api_instance.index_conan_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_conan_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_conan_get:\n") pprint(api_response) except Exception as e: @@ -17821,8 +17574,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -17854,7 +17606,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_coreimpact_get** -> RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination index_coreimpact_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCoreImpactExploitPaginatePagination index_coreimpact_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"coreimpact\" @@ -17919,8 +17671,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -17930,7 +17681,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"coreimpact\" - api_response = api_instance.index_coreimpact_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_coreimpact_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_coreimpact_get:\n") pprint(api_response) except Exception as e: @@ -17961,8 +17712,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -17994,7 +17744,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cpe_vulnerable_get** -> RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination index_cpe_vulnerable_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVCVulnerableCPEsPaginatePagination index_cpe_vulnerable_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cpe-vulnerable\" @@ -18059,8 +17809,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -18070,7 +17819,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cpe-vulnerable\" - api_response = api_instance.index_cpe_vulnerable_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cpe_vulnerable_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cpe_vulnerable_get:\n") pprint(api_response) except Exception as e: @@ -18101,8 +17850,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -18134,7 +17882,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_crestron_get** -> RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination index_crestron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCrestronPaginatePagination index_crestron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"crestron\" @@ -18199,8 +17947,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -18210,7 +17957,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"crestron\" - api_response = api_instance.index_crestron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_crestron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_crestron_get:\n") pprint(api_response) except Exception as e: @@ -18241,8 +17988,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -18274,7 +18020,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_crowdsec_get** -> RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination index_crowdsec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCrowdSecPaginatePagination index_crowdsec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"crowdsec\" @@ -18339,8 +18085,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -18350,7 +18095,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"crowdsec\" - api_response = api_instance.index_crowdsec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_crowdsec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_crowdsec_get:\n") pprint(api_response) except Exception as e: @@ -18381,8 +18126,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -18414,7 +18158,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_curl_get** -> RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination index_curl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCurlPaginatePagination index_curl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"curl\" @@ -18479,8 +18223,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -18490,7 +18233,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"curl\" - api_response = api_instance.index_curl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_curl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_curl_get:\n") pprint(api_response) except Exception as e: @@ -18521,8 +18264,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -18554,7 +18296,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_cwe_get** -> RenderResponseWithMetadataArrayApiCWEPaginatePagination index_cwe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiCWEPaginatePagination index_cwe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"cwe\" @@ -18619,8 +18361,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -18630,7 +18371,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"cwe\" - api_response = api_instance.index_cwe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_cwe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_cwe_get:\n") pprint(api_response) except Exception as e: @@ -18661,8 +18402,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -18694,7 +18434,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_dahua_get** -> RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination index_dahua_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDahuaPaginatePagination index_dahua_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"dahua\" @@ -18759,8 +18499,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -18770,7 +18509,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"dahua\" - api_response = api_instance.index_dahua_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_dahua_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_dahua_get:\n") pprint(api_response) except Exception as e: @@ -18801,8 +18540,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -18834,7 +18572,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_danfoss_get** -> RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination index_danfoss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDanfossPaginatePagination index_danfoss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"danfoss\" @@ -18899,8 +18637,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -18910,7 +18647,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"danfoss\" - api_response = api_instance.index_danfoss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_danfoss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_danfoss_get:\n") pprint(api_response) except Exception as e: @@ -18941,8 +18678,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -18974,7 +18710,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_dassault_get** -> RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination index_dassault_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDassaultPaginatePagination index_dassault_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"dassault\" @@ -19039,8 +18775,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -19050,7 +18785,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"dassault\" - api_response = api_instance.index_dassault_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_dassault_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_dassault_get:\n") pprint(api_response) except Exception as e: @@ -19081,8 +18816,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -19114,7 +18848,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_debian_dsa_get** -> RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination index_debian_dsa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDebianSecurityAdvisoryPaginatePagination index_debian_dsa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"debian-dsa\" @@ -19179,8 +18913,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -19190,7 +18923,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"debian-dsa\" - api_response = api_instance.index_debian_dsa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_debian_dsa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_debian_dsa_get:\n") pprint(api_response) except Exception as e: @@ -19221,8 +18954,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -19254,7 +18986,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_debian_get** -> RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination index_debian_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVulnerableDebianPackagePaginatePagination index_debian_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"debian\" @@ -19319,8 +19051,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -19330,7 +19061,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"debian\" - api_response = api_instance.index_debian_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_debian_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_debian_get:\n") pprint(api_response) except Exception as e: @@ -19361,8 +19092,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -19394,7 +19124,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_debian_packages_get** -> RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination index_debian_packages_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDistroPackagePaginatePagination index_debian_packages_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"debian-packages\" @@ -19459,8 +19189,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -19470,7 +19199,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"debian-packages\" - api_response = api_instance.index_debian_packages_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_debian_packages_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_debian_packages_get:\n") pprint(api_response) except Exception as e: @@ -19501,8 +19230,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -19534,7 +19262,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_debian_purls_get** -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination index_debian_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination index_debian_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"debian-purls\" @@ -19599,8 +19327,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -19610,7 +19337,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"debian-purls\" - api_response = api_instance.index_debian_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_debian_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_debian_purls_get:\n") pprint(api_response) except Exception as e: @@ -19641,8 +19368,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -19674,7 +19400,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_dell_get** -> RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination index_dell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDellPaginatePagination index_dell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"dell\" @@ -19739,8 +19465,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -19750,7 +19475,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"dell\" - api_response = api_instance.index_dell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_dell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_dell_get:\n") pprint(api_response) except Exception as e: @@ -19781,8 +19506,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -19814,7 +19538,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_delta_get** -> RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination index_delta_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDeltaAdvisoryPaginatePagination index_delta_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"delta\" @@ -19879,8 +19603,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -19890,7 +19613,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"delta\" - api_response = api_instance.index_delta_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_delta_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_delta_get:\n") pprint(api_response) except Exception as e: @@ -19921,8 +19644,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -19954,7 +19676,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_dfn_cert_get** -> RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination index_dfn_cert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDFNCertPaginatePagination index_dfn_cert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"dfn-cert\" @@ -20019,8 +19741,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -20030,7 +19751,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"dfn-cert\" - api_response = api_instance.index_dfn_cert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_dfn_cert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_dfn_cert_get:\n") pprint(api_response) except Exception as e: @@ -20061,8 +19782,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -20094,7 +19814,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_django_get** -> RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination index_django_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDjangoPaginatePagination index_django_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"django\" @@ -20159,8 +19879,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -20170,7 +19889,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"django\" - api_response = api_instance.index_django_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_django_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_django_get:\n") pprint(api_response) except Exception as e: @@ -20201,8 +19920,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -20234,7 +19952,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_dlink_get** -> RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination index_dlink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDLinkPaginatePagination index_dlink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"dlink\" @@ -20299,8 +20017,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -20310,7 +20027,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"dlink\" - api_response = api_instance.index_dlink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_dlink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_dlink_get:\n") pprint(api_response) except Exception as e: @@ -20341,8 +20058,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -20374,7 +20090,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_dnn_get** -> RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination index_dnn_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDNNPaginatePagination index_dnn_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"dnn\" @@ -20439,8 +20155,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -20450,7 +20165,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"dnn\" - api_response = api_instance.index_dnn_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_dnn_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_dnn_get:\n") pprint(api_response) except Exception as e: @@ -20481,8 +20196,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -20514,7 +20228,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_dotcms_get** -> RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination index_dotcms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDotCMSPaginatePagination index_dotcms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"dotcms\" @@ -20579,8 +20293,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -20590,7 +20303,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"dotcms\" - api_response = api_instance.index_dotcms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_dotcms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_dotcms_get:\n") pprint(api_response) except Exception as e: @@ -20621,8 +20334,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -20654,7 +20366,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_dragos_get** -> RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination index_dragos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDragosAdvisoryPaginatePagination index_dragos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"dragos\" @@ -20719,8 +20431,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -20730,7 +20441,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"dragos\" - api_response = api_instance.index_dragos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_dragos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_dragos_get:\n") pprint(api_response) except Exception as e: @@ -20761,8 +20472,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -20794,7 +20504,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_draytek_get** -> RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination index_draytek_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDraytekPaginatePagination index_draytek_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"draytek\" @@ -20859,8 +20569,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -20870,7 +20579,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"draytek\" - api_response = api_instance.index_draytek_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_draytek_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_draytek_get:\n") pprint(api_response) except Exception as e: @@ -20901,8 +20610,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -20934,7 +20642,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_drupal_get** -> RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination index_drupal_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryDrupalPaginatePagination index_drupal_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"drupal\" @@ -20999,8 +20707,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -21010,7 +20717,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"drupal\" - api_response = api_instance.index_drupal_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_drupal_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_drupal_get:\n") pprint(api_response) except Exception as e: @@ -21041,8 +20748,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -21074,7 +20780,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_eaton_get** -> RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination index_eaton_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEatonAdvisoryPaginatePagination index_eaton_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"eaton\" @@ -21139,8 +20845,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -21150,7 +20855,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"eaton\" - api_response = api_instance.index_eaton_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_eaton_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_eaton_get:\n") pprint(api_response) except Exception as e: @@ -21181,8 +20886,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -21214,7 +20918,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_elastic_get** -> RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination index_elastic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryElasticPaginatePagination index_elastic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"elastic\" @@ -21279,8 +20983,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -21290,7 +20993,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"elastic\" - api_response = api_instance.index_elastic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_elastic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_elastic_get:\n") pprint(api_response) except Exception as e: @@ -21321,8 +21024,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -21354,7 +21056,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_elspec_get** -> RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination index_elspec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryElspecPaginatePagination index_elspec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"elspec\" @@ -21419,8 +21121,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -21430,7 +21131,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"elspec\" - api_response = api_instance.index_elspec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_elspec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_elspec_get:\n") pprint(api_response) except Exception as e: @@ -21461,8 +21162,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -21494,7 +21194,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_emerging_threats_snort_get** -> RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination index_emerging_threats_snort_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEmergingThreatsSnortPaginatePagination index_emerging_threats_snort_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"emerging-threats-snort\" @@ -21559,8 +21259,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -21570,7 +21269,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"emerging-threats-snort\" - api_response = api_instance.index_emerging_threats_snort_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_emerging_threats_snort_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_emerging_threats_snort_get:\n") pprint(api_response) except Exception as e: @@ -21601,8 +21300,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -21634,7 +21332,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_emerson_get** -> RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination index_emerson_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEmersonAdvisoryPaginatePagination index_emerson_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"emerson\" @@ -21699,8 +21397,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -21710,7 +21407,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"emerson\" - api_response = api_instance.index_emerson_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_emerson_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_emerson_get:\n") pprint(api_response) except Exception as e: @@ -21741,8 +21438,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -21774,7 +21470,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_endoflife_get** -> RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination index_endoflife_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEndOfLifePaginatePagination index_endoflife_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"endoflife\" @@ -21839,8 +21535,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -21850,7 +21545,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"endoflife\" - api_response = api_instance.index_endoflife_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_endoflife_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_endoflife_get:\n") pprint(api_response) except Exception as e: @@ -21881,8 +21576,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -21914,7 +21608,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_endress_get** -> RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination index_endress_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEndressPaginatePagination index_endress_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"endress\" @@ -21979,8 +21673,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -21990,7 +21683,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"endress\" - api_response = api_instance.index_endress_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_endress_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_endress_get:\n") pprint(api_response) except Exception as e: @@ -22021,8 +21714,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -22054,7 +21746,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_eol_alibaba_get** -> RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination index_eol_alibaba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEOLAlibabaPaginatePagination index_eol_alibaba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"eol-alibaba\" @@ -22119,8 +21811,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -22130,7 +21821,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"eol-alibaba\" - api_response = api_instance.index_eol_alibaba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_eol_alibaba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_eol_alibaba_get:\n") pprint(api_response) except Exception as e: @@ -22161,8 +21852,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -22194,7 +21884,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_eol_get** -> RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination index_eol_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEOLReleaseDataPaginatePagination index_eol_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"eol\" @@ -22259,8 +21949,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -22270,7 +21959,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"eol\" - api_response = api_instance.index_eol_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_eol_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_eol_get:\n") pprint(api_response) except Exception as e: @@ -22301,8 +21990,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -22334,7 +22022,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_eol_microsoft_get** -> RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination index_eol_microsoft_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEOLMicrosoftPaginatePagination index_eol_microsoft_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"eol-microsoft\" @@ -22399,8 +22087,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -22410,7 +22097,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"eol-microsoft\" - api_response = api_instance.index_eol_microsoft_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_eol_microsoft_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_eol_microsoft_get:\n") pprint(api_response) except Exception as e: @@ -22441,8 +22128,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -22474,7 +22160,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_epss_get** -> RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination index_epss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiEPSSDataPaginatePagination index_epss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"epss\" @@ -22539,8 +22225,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -22550,7 +22235,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"epss\" - api_response = api_instance.index_epss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_epss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_epss_get:\n") pprint(api_response) except Exception as e: @@ -22581,8 +22266,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -22614,7 +22298,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_euvd_get** -> RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination index_euvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryEUVDPaginatePagination index_euvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"euvd\" @@ -22679,8 +22363,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -22690,7 +22373,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"euvd\" - api_response = api_instance.index_euvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_euvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_euvd_get:\n") pprint(api_response) except Exception as e: @@ -22721,8 +22404,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -22754,7 +22436,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_exodus_intel_get** -> RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination index_exodus_intel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryExodusIntelPaginatePagination index_exodus_intel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"exodus-intel\" @@ -22819,8 +22501,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -22830,7 +22511,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"exodus-intel\" - api_response = api_instance.index_exodus_intel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_exodus_intel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_exodus_intel_get:\n") pprint(api_response) except Exception as e: @@ -22861,8 +22542,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -22894,7 +22574,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_exploit_chains_get** -> RenderResponseWithMetadataArrayApiExploitChainPaginatePagination index_exploit_chains_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiExploitChainPaginatePagination index_exploit_chains_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"exploit-chains\" @@ -22959,8 +22639,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -22970,7 +22649,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"exploit-chains\" - api_response = api_instance.index_exploit_chains_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_exploit_chains_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_exploit_chains_get:\n") pprint(api_response) except Exception as e: @@ -23001,8 +22680,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -23034,7 +22712,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_exploitdb_get** -> RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination index_exploitdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryExploitDBExploitv2PaginatePagination index_exploitdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"exploitdb\" @@ -23099,8 +22777,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -23110,7 +22787,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"exploitdb\" - api_response = api_instance.index_exploitdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_exploitdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_exploitdb_get:\n") pprint(api_response) except Exception as e: @@ -23141,8 +22818,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -23174,7 +22850,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_exploits_changelog_get** -> RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination index_exploits_changelog_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiExploitsChangelogPaginatePagination index_exploits_changelog_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"exploits-changelog\" @@ -23239,8 +22915,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -23250,7 +22925,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"exploits-changelog\" - api_response = api_instance.index_exploits_changelog_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_exploits_changelog_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_exploits_changelog_get:\n") pprint(api_response) except Exception as e: @@ -23281,8 +22956,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -23314,7 +22988,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_exploits_get** -> RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination index_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiExploitV3ResultPaginatePagination index_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"exploits\" @@ -23379,8 +23053,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -23390,7 +23063,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"exploits\" - api_response = api_instance.index_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_exploits_get:\n") pprint(api_response) except Exception as e: @@ -23421,8 +23094,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -23454,7 +23126,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_f5_get** -> RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination index_f5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryF5PaginatePagination index_f5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"f5\" @@ -23519,8 +23191,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -23530,7 +23201,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"f5\" - api_response = api_instance.index_f5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_f5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_f5_get:\n") pprint(api_response) except Exception as e: @@ -23561,8 +23232,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -23594,7 +23264,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_f_secure_get** -> RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination index_f_secure_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFSecurePaginatePagination index_f_secure_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"f-secure\" @@ -23659,8 +23329,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -23670,7 +23339,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"f-secure\" - api_response = api_instance.index_f_secure_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_f_secure_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_f_secure_get:\n") pprint(api_response) except Exception as e: @@ -23701,8 +23370,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -23734,7 +23402,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_fanuc_get** -> RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination index_fanuc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFanucPaginatePagination index_fanuc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"fanuc\" @@ -23799,8 +23467,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -23810,7 +23477,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"fanuc\" - api_response = api_instance.index_fanuc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_fanuc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_fanuc_get:\n") pprint(api_response) except Exception as e: @@ -23841,8 +23508,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -23874,7 +23540,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_fastly_get** -> RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination index_fastly_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFastlyPaginatePagination index_fastly_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"fastly\" @@ -23939,8 +23605,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -23950,7 +23615,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"fastly\" - api_response = api_instance.index_fastly_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_fastly_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_fastly_get:\n") pprint(api_response) except Exception as e: @@ -23981,8 +23646,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -24014,7 +23678,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_fedora_get** -> RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination index_fedora_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryUpdatePaginatePagination index_fedora_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"fedora\" @@ -24079,8 +23743,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -24090,7 +23753,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"fedora\" - api_response = api_instance.index_fedora_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_fedora_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_fedora_get:\n") pprint(api_response) except Exception as e: @@ -24121,8 +23784,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -24154,7 +23816,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_festo_get** -> RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination index_festo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFestoPaginatePagination index_festo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"festo\" @@ -24219,8 +23881,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -24230,7 +23891,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"festo\" - api_response = api_instance.index_festo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_festo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_festo_get:\n") pprint(api_response) except Exception as e: @@ -24261,8 +23922,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -24294,7 +23954,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_filecloud_get** -> RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination index_filecloud_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFileCloudPaginatePagination index_filecloud_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"filecloud\" @@ -24359,8 +24019,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -24370,7 +24029,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"filecloud\" - api_response = api_instance.index_filecloud_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_filecloud_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_filecloud_get:\n") pprint(api_response) except Exception as e: @@ -24401,8 +24060,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -24434,7 +24092,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_filezilla_get** -> RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination index_filezilla_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFileZillaPaginatePagination index_filezilla_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"filezilla\" @@ -24499,8 +24157,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -24510,7 +24167,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"filezilla\" - api_response = api_instance.index_filezilla_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_filezilla_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_filezilla_get:\n") pprint(api_response) except Exception as e: @@ -24541,8 +24198,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -24574,7 +24230,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_flatt_security_get** -> RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination index_flatt_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFlattSecurityPaginatePagination index_flatt_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"flatt-security\" @@ -24639,8 +24295,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -24650,7 +24305,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"flatt-security\" - api_response = api_instance.index_flatt_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_flatt_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_flatt_security_get:\n") pprint(api_response) except Exception as e: @@ -24681,8 +24336,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -24714,7 +24368,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_forgerock_get** -> RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination index_forgerock_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryForgeRockPaginatePagination index_forgerock_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"forgerock\" @@ -24779,8 +24433,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -24790,7 +24443,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"forgerock\" - api_response = api_instance.index_forgerock_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_forgerock_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_forgerock_get:\n") pprint(api_response) except Exception as e: @@ -24821,8 +24474,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -24854,7 +24506,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_fortinet_get** -> RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination index_fortinet_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFortinetAdvisoryPaginatePagination index_fortinet_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"fortinet\" @@ -24919,8 +24571,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -24930,7 +24581,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"fortinet\" - api_response = api_instance.index_fortinet_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_fortinet_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_fortinet_get:\n") pprint(api_response) except Exception as e: @@ -24961,8 +24612,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -24994,7 +24644,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_fortinet_ips_get** -> RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination index_fortinet_ips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFortinetIPSPaginatePagination index_fortinet_ips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"fortinet-ips\" @@ -25059,8 +24709,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -25070,7 +24719,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"fortinet-ips\" - api_response = api_instance.index_fortinet_ips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_fortinet_ips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_fortinet_ips_get:\n") pprint(api_response) except Exception as e: @@ -25101,8 +24750,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -25134,7 +24782,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_foxit_get** -> RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination index_foxit_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFoxitPaginatePagination index_foxit_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"foxit\" @@ -25199,8 +24847,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -25210,7 +24857,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"foxit\" - api_response = api_instance.index_foxit_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_foxit_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_foxit_get:\n") pprint(api_response) except Exception as e: @@ -25241,8 +24888,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -25274,7 +24920,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_freebsd_get** -> RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination index_freebsd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryAdvisoryPaginatePagination index_freebsd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"freebsd\" @@ -25339,8 +24985,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -25350,7 +24995,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"freebsd\" - api_response = api_instance.index_freebsd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_freebsd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_freebsd_get:\n") pprint(api_response) except Exception as e: @@ -25381,8 +25026,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -25414,7 +25058,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_fresenius_get** -> RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination index_fresenius_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryFreseniusPaginatePagination index_fresenius_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"fresenius\" @@ -25479,8 +25123,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -25490,7 +25133,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"fresenius\" - api_response = api_instance.index_fresenius_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_fresenius_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_fresenius_get:\n") pprint(api_response) except Exception as e: @@ -25521,8 +25164,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -25554,7 +25196,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gallagher_get** -> RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination index_gallagher_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGallagherPaginatePagination index_gallagher_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gallagher\" @@ -25619,8 +25261,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -25630,7 +25271,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gallagher\" - api_response = api_instance.index_gallagher_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gallagher_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gallagher_get:\n") pprint(api_response) except Exception as e: @@ -25661,8 +25302,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -25694,7 +25334,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gcp_get** -> RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination index_gcp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGCPPaginatePagination index_gcp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gcp\" @@ -25759,8 +25399,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -25770,7 +25409,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gcp\" - api_response = api_instance.index_gcp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gcp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gcp_get:\n") pprint(api_response) except Exception as e: @@ -25801,8 +25440,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -25834,7 +25472,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ge_gas_get** -> RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination index_ge_gas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGEGasPaginatePagination index_ge_gas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ge-gas\" @@ -25899,8 +25537,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -25910,7 +25547,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ge-gas\" - api_response = api_instance.index_ge_gas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ge_gas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ge_gas_get:\n") pprint(api_response) except Exception as e: @@ -25941,8 +25578,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -25974,7 +25610,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ge_healthcare_get** -> RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination index_ge_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGEHealthcareAdvisoryPaginatePagination index_ge_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ge-healthcare\" @@ -26039,8 +25675,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -26050,7 +25685,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ge-healthcare\" - api_response = api_instance.index_ge_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ge_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ge_healthcare_get:\n") pprint(api_response) except Exception as e: @@ -26081,8 +25716,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -26114,7 +25748,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gem_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_gem_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_gem_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gem\" @@ -26179,8 +25813,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -26190,7 +25823,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gem\" - api_response = api_instance.index_gem_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gem_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gem_get:\n") pprint(api_response) except Exception as e: @@ -26221,8 +25854,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -26254,7 +25886,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gen_get** -> RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination index_gen_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGenPaginatePagination index_gen_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gen\" @@ -26319,8 +25951,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -26330,7 +25961,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gen\" - api_response = api_instance.index_gen_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gen_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gen_get:\n") pprint(api_response) except Exception as e: @@ -26361,8 +25992,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -26394,7 +26024,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_genetec_get** -> RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination index_genetec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGenetecPaginatePagination index_genetec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"genetec\" @@ -26459,8 +26089,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -26470,7 +26099,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"genetec\" - api_response = api_instance.index_genetec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_genetec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_genetec_get:\n") pprint(api_response) except Exception as e: @@ -26501,8 +26130,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -26534,7 +26162,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ghsa_get** -> RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination index_ghsa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGHSAPaginatePagination index_ghsa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ghsa\" @@ -26599,8 +26227,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -26610,7 +26237,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ghsa\" - api_response = api_instance.index_ghsa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ghsa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ghsa_get:\n") pprint(api_response) except Exception as e: @@ -26641,8 +26268,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -26674,7 +26300,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gigabyte_get** -> RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination index_gigabyte_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGigabytePaginatePagination index_gigabyte_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gigabyte\" @@ -26739,8 +26365,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -26750,7 +26375,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gigabyte\" - api_response = api_instance.index_gigabyte_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gigabyte_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gigabyte_get:\n") pprint(api_response) except Exception as e: @@ -26781,8 +26406,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -26814,7 +26438,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gitee_exploits_get** -> RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination index_gitee_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGiteeExploitPaginatePagination index_gitee_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gitee-exploits\" @@ -26879,8 +26503,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -26890,7 +26513,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gitee-exploits\" - api_response = api_instance.index_gitee_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gitee_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gitee_exploits_get:\n") pprint(api_response) except Exception as e: @@ -26921,8 +26544,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -26954,7 +26576,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_github_exploits_get** -> RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination index_github_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGitHubExploitPaginatePagination index_github_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"github-exploits\" @@ -27019,8 +26641,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -27030,7 +26651,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"github-exploits\" - api_response = api_instance.index_github_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_github_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_github_exploits_get:\n") pprint(api_response) except Exception as e: @@ -27061,8 +26682,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -27094,7 +26714,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_github_security_advisories_get** -> RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination index_github_security_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGHAdvisoryJSONLeanPaginatePagination index_github_security_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"github-security-advisories\" @@ -27159,8 +26779,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -27170,7 +26789,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"github-security-advisories\" - api_response = api_instance.index_github_security_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_github_security_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_github_security_advisories_get:\n") pprint(api_response) except Exception as e: @@ -27201,8 +26820,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -27234,7 +26852,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gitlab_advisories_community_get** -> RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination index_gitlab_advisories_community_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGitlabAdvisoryPaginatePagination index_gitlab_advisories_community_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gitlab-advisories-community\" @@ -27299,8 +26917,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -27310,7 +26927,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gitlab-advisories-community\" - api_response = api_instance.index_gitlab_advisories_community_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gitlab_advisories_community_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gitlab_advisories_community_get:\n") pprint(api_response) except Exception as e: @@ -27341,8 +26958,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -27374,7 +26990,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gitlab_exploits_get** -> RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination index_gitlab_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGitLabExploitPaginatePagination index_gitlab_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gitlab-exploits\" @@ -27439,8 +27055,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -27450,7 +27065,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gitlab-exploits\" - api_response = api_instance.index_gitlab_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gitlab_exploits_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gitlab_exploits_get:\n") pprint(api_response) except Exception as e: @@ -27481,8 +27096,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -27514,7 +27128,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_glibc_get** -> RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination index_glibc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGlibcPaginatePagination index_glibc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"glibc\" @@ -27579,8 +27193,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -27590,7 +27203,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"glibc\" - api_response = api_instance.index_glibc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_glibc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_glibc_get:\n") pprint(api_response) except Exception as e: @@ -27621,8 +27234,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -27654,7 +27266,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gmo_cybersecurity_get** -> RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination index_gmo_cybersecurity_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGMOCyberSecurityPaginatePagination index_gmo_cybersecurity_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gmo-cybersecurity\" @@ -27719,8 +27331,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -27730,7 +27341,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gmo-cybersecurity\" - api_response = api_instance.index_gmo_cybersecurity_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gmo_cybersecurity_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gmo_cybersecurity_get:\n") pprint(api_response) except Exception as e: @@ -27761,8 +27372,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -27794,7 +27404,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_gnutls_get** -> RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination index_gnutls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGnuTLSPaginatePagination index_gnutls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"gnutls\" @@ -27859,8 +27469,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -27870,7 +27479,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"gnutls\" - api_response = api_instance.index_gnutls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_gnutls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_gnutls_get:\n") pprint(api_response) except Exception as e: @@ -27901,8 +27510,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -27934,7 +27542,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_go_vulndb_get** -> RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination index_go_vulndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGoVulnJSONPaginatePagination index_go_vulndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"go-vulndb\" @@ -27999,8 +27607,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -28010,7 +27617,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"go-vulndb\" - api_response = api_instance.index_go_vulndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_go_vulndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_go_vulndb_get:\n") pprint(api_response) except Exception as e: @@ -28041,8 +27648,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -28074,7 +27680,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_golang_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_golang_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_golang_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"golang\" @@ -28139,8 +27745,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -28150,7 +27755,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"golang\" - api_response = api_instance.index_golang_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_golang_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_golang_get:\n") pprint(api_response) except Exception as e: @@ -28181,8 +27786,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -28214,7 +27818,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_google0day_itw_get** -> RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination index_google0day_itw_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryITWExploitPaginatePagination index_google0day_itw_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"google-0day-itw\" @@ -28279,8 +27883,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -28290,7 +27893,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"google-0day-itw\" - api_response = api_instance.index_google0day_itw_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_google0day_itw_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_google0day_itw_get:\n") pprint(api_response) except Exception as e: @@ -28321,8 +27924,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -28354,7 +27956,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_google_container_optimized_os_get** -> RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination index_google_container_optimized_os_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryContainerOSPaginatePagination index_google_container_optimized_os_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"google-container-optimized-os\" @@ -28419,8 +28021,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -28430,7 +28031,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"google-container-optimized-os\" - api_response = api_instance.index_google_container_optimized_os_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_google_container_optimized_os_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_google_container_optimized_os_get:\n") pprint(api_response) except Exception as e: @@ -28461,8 +28062,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -28494,7 +28094,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_grafana_get** -> RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination index_grafana_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGrafanaPaginatePagination index_grafana_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"grafana\" @@ -28559,8 +28159,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -28570,7 +28169,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"grafana\" - api_response = api_instance.index_grafana_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_grafana_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_grafana_get:\n") pprint(api_response) except Exception as e: @@ -28601,8 +28200,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -28634,7 +28232,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_greynoise_metadata_get** -> RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination index_greynoise_metadata_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryGreyNoiseDetectionPaginatePagination index_greynoise_metadata_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"greynoise-metadata\" @@ -28699,8 +28297,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -28710,7 +28307,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"greynoise-metadata\" - api_response = api_instance.index_greynoise_metadata_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_greynoise_metadata_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_greynoise_metadata_get:\n") pprint(api_response) except Exception as e: @@ -28741,8 +28338,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -28774,7 +28370,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hackage_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_hackage_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_hackage_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hackage\" @@ -28839,8 +28435,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -28850,7 +28445,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hackage\" - api_response = api_instance.index_hackage_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hackage_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hackage_get:\n") pprint(api_response) except Exception as e: @@ -28881,8 +28476,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -28914,7 +28508,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hacktivity_get** -> RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination index_hacktivity_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHacktivityPaginatePagination index_hacktivity_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hacktivity\" @@ -28979,8 +28573,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -28990,7 +28583,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hacktivity\" - api_response = api_instance.index_hacktivity_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hacktivity_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hacktivity_get:\n") pprint(api_response) except Exception as e: @@ -29021,8 +28614,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -29054,7 +28646,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_harmonyos_get** -> RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination index_harmonyos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHarmonyOSPaginatePagination index_harmonyos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"harmonyos\" @@ -29119,8 +28711,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -29130,7 +28721,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"harmonyos\" - api_response = api_instance.index_harmonyos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_harmonyos_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_harmonyos_get:\n") pprint(api_response) except Exception as e: @@ -29161,8 +28752,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -29194,7 +28784,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hashicorp_get** -> RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination index_hashicorp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHashiCorpPaginatePagination index_hashicorp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hashicorp\" @@ -29259,8 +28849,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -29270,7 +28859,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hashicorp\" - api_response = api_instance.index_hashicorp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hashicorp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hashicorp_get:\n") pprint(api_response) except Exception as e: @@ -29301,8 +28890,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -29334,7 +28922,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_haskell_sadb_get** -> RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination index_haskell_sadb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHaskellSADBAdvisoryPaginatePagination index_haskell_sadb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"haskell-sadb\" @@ -29399,8 +28987,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -29410,7 +28997,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"haskell-sadb\" - api_response = api_instance.index_haskell_sadb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_haskell_sadb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_haskell_sadb_get:\n") pprint(api_response) except Exception as e: @@ -29441,8 +29028,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -29474,7 +29060,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hcl_get** -> RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination index_hcl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHCLPaginatePagination index_hcl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hcl\" @@ -29539,8 +29125,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -29550,7 +29135,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hcl\" - api_response = api_instance.index_hcl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hcl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hcl_get:\n") pprint(api_response) except Exception as e: @@ -29581,8 +29166,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -29614,7 +29198,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hex_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_hex_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_hex_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hex\" @@ -29679,8 +29263,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -29690,7 +29273,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hex\" - api_response = api_instance.index_hex_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hex_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hex_get:\n") pprint(api_response) except Exception as e: @@ -29721,8 +29304,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -29754,7 +29336,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hikvision_get** -> RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination index_hikvision_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHIKVisionPaginatePagination index_hikvision_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hikvision\" @@ -29819,8 +29401,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -29830,7 +29411,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hikvision\" - api_response = api_instance.index_hikvision_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hikvision_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hikvision_get:\n") pprint(api_response) except Exception as e: @@ -29861,8 +29442,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -29894,7 +29474,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hillrom_get** -> RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination index_hillrom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHillromAdvisoryPaginatePagination index_hillrom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hillrom\" @@ -29959,8 +29539,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -29970,7 +29549,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hillrom\" - api_response = api_instance.index_hillrom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hillrom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hillrom_get:\n") pprint(api_response) except Exception as e: @@ -30001,8 +29580,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -30034,7 +29612,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hitachi_energy_get** -> RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination index_hitachi_energy_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHitachiEnergyPaginatePagination index_hitachi_energy_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hitachi-energy\" @@ -30099,8 +29677,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -30110,7 +29687,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hitachi-energy\" - api_response = api_instance.index_hitachi_energy_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hitachi_energy_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hitachi_energy_get:\n") pprint(api_response) except Exception as e: @@ -30141,8 +29718,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -30174,7 +29750,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hitachi_get** -> RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination index_hitachi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHitachiPaginatePagination index_hitachi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hitachi\" @@ -30239,8 +29815,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -30250,7 +29825,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hitachi\" - api_response = api_instance.index_hitachi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hitachi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hitachi_get:\n") pprint(api_response) except Exception as e: @@ -30281,8 +29856,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -30314,7 +29888,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hkcert_get** -> RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination index_hkcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHKCertPaginatePagination index_hkcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hkcert\" @@ -30379,8 +29953,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -30390,7 +29963,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hkcert\" - api_response = api_instance.index_hkcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hkcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hkcert_get:\n") pprint(api_response) except Exception as e: @@ -30421,8 +29994,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -30454,7 +30026,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hms_get** -> RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination index_hms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHMSPaginatePagination index_hms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hms\" @@ -30519,8 +30091,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -30530,7 +30101,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hms\" - api_response = api_instance.index_hms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hms_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hms_get:\n") pprint(api_response) except Exception as e: @@ -30561,8 +30132,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -30594,7 +30164,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_honeywell_get** -> RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination index_honeywell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHoneywellPaginatePagination index_honeywell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"honeywell\" @@ -30659,8 +30229,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -30670,7 +30239,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"honeywell\" - api_response = api_instance.index_honeywell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_honeywell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_honeywell_get:\n") pprint(api_response) except Exception as e: @@ -30701,8 +30270,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -30734,7 +30302,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hp_get** -> RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination index_hp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHPPaginatePagination index_hp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hp\" @@ -30799,8 +30367,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -30810,7 +30377,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hp\" - api_response = api_instance.index_hp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hp_get:\n") pprint(api_response) except Exception as e: @@ -30841,8 +30408,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -30874,7 +30440,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_hpe_get** -> RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination index_hpe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHPEPaginatePagination index_hpe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"hpe\" @@ -30939,8 +30505,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -30950,7 +30515,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"hpe\" - api_response = api_instance.index_hpe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_hpe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_hpe_get:\n") pprint(api_response) except Exception as e: @@ -30981,8 +30546,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -31014,7 +30578,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_huawei_euleros_get** -> RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination index_huawei_euleros_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHuaweiEulerOSPaginatePagination index_huawei_euleros_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"huawei-euleros\" @@ -31079,8 +30643,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -31090,7 +30653,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"huawei-euleros\" - api_response = api_instance.index_huawei_euleros_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_huawei_euleros_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_huawei_euleros_get:\n") pprint(api_response) except Exception as e: @@ -31121,8 +30684,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -31154,7 +30716,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_huawei_ips_get** -> RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination index_huawei_ips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHuaweiIPSPaginatePagination index_huawei_ips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"huawei-ips\" @@ -31219,8 +30781,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -31230,7 +30791,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"huawei-ips\" - api_response = api_instance.index_huawei_ips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_huawei_ips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_huawei_ips_get:\n") pprint(api_response) except Exception as e: @@ -31261,8 +30822,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -31294,7 +30854,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_huawei_psirt_get** -> RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination index_huawei_psirt_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryHuaweiPaginatePagination index_huawei_psirt_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"huawei-psirt\" @@ -31359,8 +30919,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -31370,7 +30929,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"huawei-psirt\" - api_response = api_instance.index_huawei_psirt_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_huawei_psirt_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_huawei_psirt_get:\n") pprint(api_response) except Exception as e: @@ -31401,8 +30960,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -31434,7 +30992,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_iava_get** -> RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination index_iava_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIAVAPaginatePagination index_iava_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"iava\" @@ -31499,8 +31057,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -31510,7 +31067,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"iava\" - api_response = api_instance.index_iava_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_iava_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_iava_get:\n") pprint(api_response) except Exception as e: @@ -31541,8 +31098,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -31574,7 +31130,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ibm_get** -> RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination index_ibm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIBMPaginatePagination index_ibm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ibm\" @@ -31639,8 +31195,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -31650,7 +31205,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ibm\" - api_response = api_instance.index_ibm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ibm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ibm_get:\n") pprint(api_response) except Exception as e: @@ -31681,8 +31236,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -31714,7 +31268,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_idemia_get** -> RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination index_idemia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIdemiaPaginatePagination index_idemia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"idemia\" @@ -31779,8 +31333,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -31790,7 +31343,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"idemia\" - api_response = api_instance.index_idemia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_idemia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_idemia_get:\n") pprint(api_response) except Exception as e: @@ -31821,8 +31374,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -31854,7 +31406,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_igel_get** -> RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination index_igel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIgelPaginatePagination index_igel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"igel\" @@ -31919,8 +31471,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -31930,7 +31481,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"igel\" - api_response = api_instance.index_igel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_igel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_igel_get:\n") pprint(api_response) except Exception as e: @@ -31961,8 +31512,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -31994,7 +31544,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_il_alerts_get** -> RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination index_il_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIsraeliAlertPaginatePagination index_il_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"il-alerts\" @@ -32059,8 +31609,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -32070,7 +31619,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"il-alerts\" - api_response = api_instance.index_il_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_il_alerts_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_il_alerts_get:\n") pprint(api_response) except Exception as e: @@ -32101,8 +31650,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -32134,7 +31682,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_il_vulnerabilities_get** -> RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination index_il_vulnerabilities_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIsraeliVulnerabilityPaginatePagination index_il_vulnerabilities_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"il-vulnerabilities\" @@ -32199,8 +31747,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -32210,7 +31757,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"il-vulnerabilities\" - api_response = api_instance.index_il_vulnerabilities_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_il_vulnerabilities_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_il_vulnerabilities_get:\n") pprint(api_response) except Exception as e: @@ -32241,8 +31788,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -32274,7 +31820,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_incibe_get** -> RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination index_incibe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIncibeAdvisoryPaginatePagination index_incibe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"incibe\" @@ -32339,8 +31885,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -32350,7 +31895,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"incibe\" - api_response = api_instance.index_incibe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_incibe_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_incibe_get:\n") pprint(api_response) except Exception as e: @@ -32381,8 +31926,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -32414,7 +31958,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_initial_access_get** -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination index_initial_access_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination index_initial_access_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"initial-access\" @@ -32479,8 +32023,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -32490,7 +32033,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"initial-access\" - api_response = api_instance.index_initial_access_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_initial_access_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_initial_access_get:\n") pprint(api_response) except Exception as e: @@ -32521,8 +32064,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -32554,7 +32096,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_initial_access_git_get** -> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination index_initial_access_git_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiInitialAccessPaginatePagination index_initial_access_git_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"initial-access-git\" @@ -32619,8 +32161,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -32630,7 +32171,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"initial-access-git\" - api_response = api_instance.index_initial_access_git_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_initial_access_git_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_initial_access_git_get:\n") pprint(api_response) except Exception as e: @@ -32661,8 +32202,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -32694,7 +32234,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_intel_get** -> RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination index_intel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIntelPaginatePagination index_intel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"intel\" @@ -32759,8 +32299,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -32770,7 +32309,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"intel\" - api_response = api_instance.index_intel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_intel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_intel_get:\n") pprint(api_response) except Exception as e: @@ -32801,8 +32340,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -32834,7 +32372,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ipintel10d_get** -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination index_ipintel10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination index_ipintel10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ipintel-10d\" @@ -32904,8 +32442,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: kind = 'kind_example' # str | Kind of IpIntel Finding (optional) hostname = 'hostname_example' # str | Match a string in the list of hostnames (optional) matches = 'matches_example' # str | Search for a string in the field describing the finding (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -32915,7 +32452,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ipintel-10d\" - api_response = api_instance.index_ipintel10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ipintel10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ipintel10d_get:\n") pprint(api_response) except Exception as e: @@ -32951,8 +32488,7 @@ Name | Type | Description | Notes **kind** | **str**| Kind of IpIntel Finding | [optional] **hostname** | **str**| Match a string in the list of hostnames | [optional] **matches** | **str**| Search for a string in the field describing the finding | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -32984,7 +32520,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ipintel30d_get** -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination index_ipintel30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination index_ipintel30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ipintel-30d\" @@ -33054,8 +32590,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: kind = 'kind_example' # str | Kind of IpIntel Finding (optional) hostname = 'hostname_example' # str | Match a string in the list of hostnames (optional) matches = 'matches_example' # str | Search for a string in the field describing the finding (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -33065,7 +32600,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ipintel-30d\" - api_response = api_instance.index_ipintel30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ipintel30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ipintel30d_get:\n") pprint(api_response) except Exception as e: @@ -33101,8 +32636,7 @@ Name | Type | Description | Notes **kind** | **str**| Kind of IpIntel Finding | [optional] **hostname** | **str**| Match a string in the list of hostnames | [optional] **matches** | **str**| Search for a string in the field describing the finding | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -33134,7 +32668,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ipintel3d_get** -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination index_ipintel3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination index_ipintel3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ipintel-3d\" @@ -33204,8 +32738,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: kind = 'kind_example' # str | Kind of IpIntel Finding (optional) hostname = 'hostname_example' # str | Match a string in the list of hostnames (optional) matches = 'matches_example' # str | Search for a string in the field describing the finding (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -33215,7 +32748,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ipintel-3d\" - api_response = api_instance.index_ipintel3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ipintel3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ipintel3d_get:\n") pprint(api_response) except Exception as e: @@ -33251,8 +32784,7 @@ Name | Type | Description | Notes **kind** | **str**| Kind of IpIntel Finding | [optional] **hostname** | **str**| Match a string in the list of hostnames | [optional] **matches** | **str**| Search for a string in the field describing the finding | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -33284,7 +32816,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ipintel90d_get** -> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination index_ipintel90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIpIntelRecordPaginatePagination index_ipintel90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ipintel-90d\" @@ -33354,8 +32886,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: kind = 'kind_example' # str | Kind of IpIntel Finding (optional) hostname = 'hostname_example' # str | Match a string in the list of hostnames (optional) matches = 'matches_example' # str | Search for a string in the field describing the finding (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -33365,7 +32896,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ipintel-90d\" - api_response = api_instance.index_ipintel90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ipintel90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, cidr=cidr, asn=asn, country=country, country_code=country_code, id=id, kind=kind, hostname=hostname, matches=matches, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ipintel90d_get:\n") pprint(api_response) except Exception as e: @@ -33401,8 +32932,7 @@ Name | Type | Description | Notes **kind** | **str**| Kind of IpIntel Finding | [optional] **hostname** | **str**| Match a string in the list of hostnames | [optional] **matches** | **str**| Search for a string in the field describing the finding | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -33434,7 +32964,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_istio_get** -> RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination index_istio_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIstioPaginatePagination index_istio_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"istio\" @@ -33499,8 +33029,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -33510,7 +33039,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"istio\" - api_response = api_instance.index_istio_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_istio_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_istio_get:\n") pprint(api_response) except Exception as e: @@ -33541,8 +33070,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -33574,7 +33102,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ivanti_get** -> RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination index_ivanti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIvantiPaginatePagination index_ivanti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ivanti\" @@ -33639,8 +33167,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -33650,7 +33177,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ivanti\" - api_response = api_instance.index_ivanti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ivanti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ivanti_get:\n") pprint(api_response) except Exception as e: @@ -33681,8 +33208,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -33714,7 +33240,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ivanti_rss_get** -> RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination index_ivanti_rss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryIvantiRSSPaginatePagination index_ivanti_rss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ivanti-rss\" @@ -33779,8 +33305,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -33790,7 +33315,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ivanti-rss\" - api_response = api_instance.index_ivanti_rss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ivanti_rss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ivanti_rss_get:\n") pprint(api_response) except Exception as e: @@ -33821,8 +33346,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -33854,7 +33378,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_jenkins_get** -> RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination index_jenkins_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryJenkinsPaginatePagination index_jenkins_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"jenkins\" @@ -33919,8 +33443,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -33930,7 +33453,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"jenkins\" - api_response = api_instance.index_jenkins_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_jenkins_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_jenkins_get:\n") pprint(api_response) except Exception as e: @@ -33961,8 +33484,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -33994,7 +33516,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_jetbrains_get** -> RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination index_jetbrains_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryJetBrainsPaginatePagination index_jetbrains_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"jetbrains\" @@ -34059,8 +33581,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -34070,7 +33591,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"jetbrains\" - api_response = api_instance.index_jetbrains_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_jetbrains_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_jetbrains_get:\n") pprint(api_response) except Exception as e: @@ -34101,8 +33622,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -34134,7 +33654,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_jfrog_get** -> RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination index_jfrog_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryJFrogPaginatePagination index_jfrog_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"jfrog\" @@ -34199,8 +33719,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -34210,7 +33729,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"jfrog\" - api_response = api_instance.index_jfrog_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_jfrog_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_jfrog_get:\n") pprint(api_response) except Exception as e: @@ -34241,8 +33760,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -34274,7 +33792,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_jnj_get** -> RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination index_jnj_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryJNJAdvisoryPaginatePagination index_jnj_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"jnj\" @@ -34339,8 +33857,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -34350,7 +33867,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"jnj\" - api_response = api_instance.index_jnj_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_jnj_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_jnj_get:\n") pprint(api_response) except Exception as e: @@ -34381,8 +33898,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -34414,7 +33930,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_johnson_controls_get** -> RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination index_johnson_controls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryJohnsonControlsPaginatePagination index_johnson_controls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"johnson-controls\" @@ -34479,8 +33995,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -34490,7 +34005,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"johnson-controls\" - api_response = api_instance.index_johnson_controls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_johnson_controls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_johnson_controls_get:\n") pprint(api_response) except Exception as e: @@ -34521,8 +34036,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -34554,7 +34068,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_juniper_get** -> RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination index_juniper_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryJuniperPaginatePagination index_juniper_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"juniper\" @@ -34619,8 +34133,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -34630,7 +34143,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"juniper\" - api_response = api_instance.index_juniper_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_juniper_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_juniper_get:\n") pprint(api_response) except Exception as e: @@ -34661,8 +34174,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -34694,7 +34206,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_jvn_get** -> RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination index_jvn_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryJVNPaginatePagination index_jvn_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"jvn\" @@ -34759,8 +34271,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -34770,7 +34281,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"jvn\" - api_response = api_instance.index_jvn_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_jvn_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_jvn_get:\n") pprint(api_response) except Exception as e: @@ -34801,8 +34312,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -34834,7 +34344,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_jvndb_get** -> RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination index_jvndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryJVNAdvisoryItemPaginatePagination index_jvndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"jvndb\" @@ -34899,8 +34409,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -34910,7 +34419,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"jvndb\" - api_response = api_instance.index_jvndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_jvndb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_jvndb_get:\n") pprint(api_response) except Exception as e: @@ -34941,8 +34450,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -34974,7 +34482,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_kaspersky_ics_cert_get** -> RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination index_kaspersky_ics_cert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryKasperskyICSCERTAdvisoryPaginatePagination index_kaspersky_ics_cert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"kaspersky-ics-cert\" @@ -35039,8 +34547,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -35050,7 +34557,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"kaspersky-ics-cert\" - api_response = api_instance.index_kaspersky_ics_cert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_kaspersky_ics_cert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_kaspersky_ics_cert_get:\n") pprint(api_response) except Exception as e: @@ -35081,8 +34588,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -35114,7 +34620,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_korelogic_get** -> RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination index_korelogic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryKoreLogicPaginatePagination index_korelogic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"korelogic\" @@ -35179,8 +34685,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -35190,7 +34695,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"korelogic\" - api_response = api_instance.index_korelogic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_korelogic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_korelogic_get:\n") pprint(api_response) except Exception as e: @@ -35221,8 +34726,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -35254,7 +34758,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_krcert_security_notices_get** -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination index_krcert_security_notices_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination index_krcert_security_notices_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"krcert-security-notices\" @@ -35319,8 +34823,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -35330,7 +34833,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"krcert-security-notices\" - api_response = api_instance.index_krcert_security_notices_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_krcert_security_notices_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_krcert_security_notices_get:\n") pprint(api_response) except Exception as e: @@ -35361,8 +34864,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -35394,7 +34896,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_krcert_vulnerabilities_get** -> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination index_krcert_vulnerabilities_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryKRCertAdvisoryPaginatePagination index_krcert_vulnerabilities_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"krcert-vulnerabilities\" @@ -35459,8 +34961,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -35470,7 +34971,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"krcert-vulnerabilities\" - api_response = api_instance.index_krcert_vulnerabilities_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_krcert_vulnerabilities_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_krcert_vulnerabilities_get:\n") pprint(api_response) except Exception as e: @@ -35501,8 +35002,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -35534,7 +35034,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_kubernetes_get** -> RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination index_kubernetes_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryK8SPaginatePagination index_kubernetes_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"kubernetes\" @@ -35599,8 +35099,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -35610,7 +35109,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"kubernetes\" - api_response = api_instance.index_kubernetes_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_kubernetes_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_kubernetes_get:\n") pprint(api_response) except Exception as e: @@ -35641,8 +35140,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -35674,7 +35172,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_kunbus_get** -> RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination index_kunbus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryKunbusPaginatePagination index_kunbus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"kunbus\" @@ -35739,8 +35237,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -35750,7 +35247,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"kunbus\" - api_response = api_instance.index_kunbus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_kunbus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_kunbus_get:\n") pprint(api_response) except Exception as e: @@ -35781,8 +35278,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -35814,7 +35310,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_lantronix_get** -> RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination index_lantronix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryLantronixPaginatePagination index_lantronix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"lantronix\" @@ -35879,8 +35375,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -35890,7 +35385,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"lantronix\" - api_response = api_instance.index_lantronix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_lantronix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_lantronix_get:\n") pprint(api_response) except Exception as e: @@ -35921,8 +35416,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -35954,7 +35448,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_lenovo_get** -> RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination index_lenovo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryLenovoPaginatePagination index_lenovo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"lenovo\" @@ -36019,8 +35513,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -36030,7 +35523,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"lenovo\" - api_response = api_instance.index_lenovo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_lenovo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_lenovo_get:\n") pprint(api_response) except Exception as e: @@ -36061,8 +35554,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -36094,7 +35586,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_lexmark_get** -> RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination index_lexmark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryLexmarkAdvisoryPaginatePagination index_lexmark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"lexmark\" @@ -36159,8 +35651,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -36170,7 +35661,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"lexmark\" - api_response = api_instance.index_lexmark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_lexmark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_lexmark_get:\n") pprint(api_response) except Exception as e: @@ -36201,8 +35692,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -36234,7 +35724,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_lg_get** -> RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination index_lg_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryLGPaginatePagination index_lg_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"lg\" @@ -36299,8 +35789,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -36310,7 +35799,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"lg\" - api_response = api_instance.index_lg_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_lg_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_lg_get:\n") pprint(api_response) except Exception as e: @@ -36341,8 +35830,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -36374,7 +35862,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_libre_office_get** -> RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination index_libre_office_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryLibreOfficePaginatePagination index_libre_office_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"libre-office\" @@ -36439,8 +35927,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -36450,7 +35937,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"libre-office\" - api_response = api_instance.index_libre_office_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_libre_office_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_libre_office_get:\n") pprint(api_response) except Exception as e: @@ -36481,8 +35968,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -36514,7 +36000,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_linux_get** -> RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination index_linux_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryLinuxPaginatePagination index_linux_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"linux\" @@ -36579,8 +36065,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -36590,7 +36075,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"linux\" - api_response = api_instance.index_linux_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_linux_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_linux_get:\n") pprint(api_response) except Exception as e: @@ -36621,8 +36106,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -36654,7 +36138,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_lol_advs_get** -> RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination index_lol_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryLolAdvsPaginatePagination index_lol_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"lol-advs\" @@ -36719,8 +36203,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -36730,7 +36213,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"lol-advs\" - api_response = api_instance.index_lol_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_lol_advs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_lol_advs_get:\n") pprint(api_response) except Exception as e: @@ -36761,8 +36244,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -36794,7 +36276,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_m_files_get** -> RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination index_m_files_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMFilesPaginatePagination index_m_files_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"m-files\" @@ -36859,8 +36341,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -36870,7 +36351,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"m-files\" - api_response = api_instance.index_m_files_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_m_files_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_m_files_get:\n") pprint(api_response) except Exception as e: @@ -36901,8 +36382,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -36934,7 +36414,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_macert_get** -> RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination index_macert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMACertPaginatePagination index_macert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"macert\" @@ -36999,8 +36479,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -37010,7 +36489,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"macert\" - api_response = api_instance.index_macert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_macert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_macert_get:\n") pprint(api_response) except Exception as e: @@ -37041,8 +36520,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -37074,7 +36552,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_malicious_packages_get** -> RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination index_malicious_packages_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMaliciousPackagePaginatePagination index_malicious_packages_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"malicious-packages\" @@ -37139,8 +36617,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -37150,7 +36627,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"malicious-packages\" - api_response = api_instance.index_malicious_packages_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_malicious_packages_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_malicious_packages_get:\n") pprint(api_response) except Exception as e: @@ -37181,8 +36658,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -37214,7 +36690,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_manageengine_get** -> RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination index_manageengine_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryManageEngineAdvisoryPaginatePagination index_manageengine_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"manageengine\" @@ -37279,8 +36755,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -37290,7 +36765,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"manageengine\" - api_response = api_instance.index_manageengine_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_manageengine_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_manageengine_get:\n") pprint(api_response) except Exception as e: @@ -37321,8 +36796,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -37354,7 +36828,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_maven_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_maven_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_maven_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"maven\" @@ -37419,8 +36893,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -37430,7 +36903,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"maven\" - api_response = api_instance.index_maven_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_maven_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_maven_get:\n") pprint(api_response) except Exception as e: @@ -37461,8 +36934,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -37494,7 +36966,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mbed_tls_get** -> RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination index_mbed_tls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMbedTLSPaginatePagination index_mbed_tls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mbed-tls\" @@ -37559,8 +37031,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -37570,7 +37041,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mbed-tls\" - api_response = api_instance.index_mbed_tls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mbed_tls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mbed_tls_get:\n") pprint(api_response) except Exception as e: @@ -37601,8 +37072,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -37634,7 +37104,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mcafee_get** -> RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination index_mcafee_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMcAfeePaginatePagination index_mcafee_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mcafee\" @@ -37699,8 +37169,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -37710,7 +37179,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mcafee\" - api_response = api_instance.index_mcafee_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mcafee_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mcafee_get:\n") pprint(api_response) except Exception as e: @@ -37741,8 +37210,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -37774,7 +37242,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mediatek_get** -> RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination index_mediatek_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMediatekPaginatePagination index_mediatek_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mediatek\" @@ -37839,8 +37307,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -37850,7 +37317,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mediatek\" - api_response = api_instance.index_mediatek_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mediatek_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mediatek_get:\n") pprint(api_response) except Exception as e: @@ -37881,8 +37348,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -37914,7 +37380,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_medtronic_get** -> RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination index_medtronic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMedtronicAdvisoryPaginatePagination index_medtronic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"medtronic\" @@ -37979,8 +37445,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -37990,7 +37455,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"medtronic\" - api_response = api_instance.index_medtronic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_medtronic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_medtronic_get:\n") pprint(api_response) except Exception as e: @@ -38021,8 +37486,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -38054,7 +37518,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mendix_get** -> RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination index_mendix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMendixPaginatePagination index_mendix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mendix\" @@ -38119,8 +37583,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -38130,7 +37593,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mendix\" - api_response = api_instance.index_mendix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mendix_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mendix_get:\n") pprint(api_response) except Exception as e: @@ -38161,8 +37624,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -38194,7 +37656,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_meta_advisories_get** -> RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination index_meta_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMetaAdvisoriesPaginatePagination index_meta_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"meta-advisories\" @@ -38259,8 +37721,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -38270,7 +37731,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"meta-advisories\" - api_response = api_instance.index_meta_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_meta_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_meta_advisories_get:\n") pprint(api_response) except Exception as e: @@ -38301,8 +37762,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -38334,7 +37794,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_metasploit_get** -> RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination index_metasploit_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMetasploitExploitPaginatePagination index_metasploit_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"metasploit\" @@ -38399,8 +37859,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -38410,7 +37869,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"metasploit\" - api_response = api_instance.index_metasploit_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_metasploit_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_metasploit_get:\n") pprint(api_response) except Exception as e: @@ -38441,8 +37900,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -38474,7 +37932,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_microsoft_csaf_get** -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination index_microsoft_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMicrosoftCSAFPaginatePagination index_microsoft_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"microsoft-csaf\" @@ -38539,8 +37997,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -38550,7 +38007,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"microsoft-csaf\" - api_response = api_instance.index_microsoft_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_microsoft_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_microsoft_csaf_get:\n") pprint(api_response) except Exception as e: @@ -38581,8 +38038,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -38614,7 +38070,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_microsoft_cvrf_get** -> RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination index_microsoft_cvrf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMicrosoftCVRFPaginatePagination index_microsoft_cvrf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"microsoft-cvrf\" @@ -38679,8 +38135,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -38690,7 +38145,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"microsoft-cvrf\" - api_response = api_instance.index_microsoft_cvrf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_microsoft_cvrf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_microsoft_cvrf_get:\n") pprint(api_response) except Exception as e: @@ -38721,8 +38176,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -38754,7 +38208,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_microsoft_driver_block_list_get** -> RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination index_microsoft_driver_block_list_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMicrosoftDriverBlockListPaginatePagination index_microsoft_driver_block_list_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"microsoft-driver-block-list\" @@ -38819,8 +38273,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -38830,7 +38283,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"microsoft-driver-block-list\" - api_response = api_instance.index_microsoft_driver_block_list_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_microsoft_driver_block_list_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_microsoft_driver_block_list_get:\n") pprint(api_response) except Exception as e: @@ -38861,8 +38314,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -38894,7 +38346,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_microsoft_kb_get** -> RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination index_microsoft_kb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMicrosoftKbPaginatePagination index_microsoft_kb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"microsoft-kb\" @@ -38959,8 +38411,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -38970,7 +38421,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"microsoft-kb\" - api_response = api_instance.index_microsoft_kb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_microsoft_kb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_microsoft_kb_get:\n") pprint(api_response) except Exception as e: @@ -39001,8 +38452,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -39034,7 +38484,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mikrotik_get** -> RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination index_mikrotik_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMikrotikPaginatePagination index_mikrotik_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mikrotik\" @@ -39099,8 +38549,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -39110,7 +38559,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mikrotik\" - api_response = api_instance.index_mikrotik_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mikrotik_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mikrotik_get:\n") pprint(api_response) except Exception as e: @@ -39141,8 +38590,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -39174,7 +38622,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mindray_get** -> RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination index_mindray_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMindrayPaginatePagination index_mindray_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mindray\" @@ -39239,8 +38687,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -39250,7 +38697,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mindray\" - api_response = api_instance.index_mindray_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mindray_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mindray_get:\n") pprint(api_response) except Exception as e: @@ -39281,8 +38728,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -39314,7 +38760,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_misp_threat_actors_get** -> RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination index_misp_threat_actors_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMispValuePaginatePagination index_misp_threat_actors_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"misp-threat-actors\" @@ -39379,8 +38825,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -39390,7 +38835,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"misp-threat-actors\" - api_response = api_instance.index_misp_threat_actors_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_misp_threat_actors_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_misp_threat_actors_get:\n") pprint(api_response) except Exception as e: @@ -39421,8 +38866,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -39454,7 +38898,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mitel_get** -> RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination index_mitel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMitelPaginatePagination index_mitel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mitel\" @@ -39519,8 +38963,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -39530,7 +38973,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mitel\" - api_response = api_instance.index_mitel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mitel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mitel_get:\n") pprint(api_response) except Exception as e: @@ -39561,8 +39004,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -39594,7 +39036,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mitre_attack_cve_get** -> RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination index_mitre_attack_cve_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiMitreAttackToCVEPaginatePagination index_mitre_attack_cve_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mitre-attack-cve\" @@ -39659,8 +39101,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -39670,7 +39111,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mitre-attack-cve\" - api_response = api_instance.index_mitre_attack_cve_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mitre_attack_cve_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mitre_attack_cve_get:\n") pprint(api_response) except Exception as e: @@ -39701,8 +39142,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -39734,7 +39174,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mitre_cvelist_v5_get** -> RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination index_mitre_cvelist_v5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMitreCVEListV5PaginatePagination index_mitre_cvelist_v5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mitre-cvelist-v5\" @@ -39799,8 +39239,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -39810,7 +39249,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mitre-cvelist-v5\" - api_response = api_instance.index_mitre_cvelist_v5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mitre_cvelist_v5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mitre_cvelist_v5_get:\n") pprint(api_response) except Exception as e: @@ -39841,8 +39280,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -39874,7 +39312,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mitsubishi_electric_get** -> RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination index_mitsubishi_electric_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMitsubishiElectricAdvisoryPaginatePagination index_mitsubishi_electric_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mitsubishi-electric\" @@ -39939,8 +39377,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -39950,7 +39387,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mitsubishi-electric\" - api_response = api_instance.index_mitsubishi_electric_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mitsubishi_electric_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mitsubishi_electric_get:\n") pprint(api_response) except Exception as e: @@ -39981,8 +39418,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -40014,7 +39450,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mongodb_get** -> RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination index_mongodb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMongoDBPaginatePagination index_mongodb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mongodb\" @@ -40079,8 +39515,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -40090,7 +39525,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mongodb\" - api_response = api_instance.index_mongodb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mongodb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mongodb_get:\n") pprint(api_response) except Exception as e: @@ -40121,8 +39556,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -40154,7 +39588,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_moxa_get** -> RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination index_moxa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMoxaAdvisoryPaginatePagination index_moxa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"moxa\" @@ -40219,8 +39653,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -40230,7 +39663,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"moxa\" - api_response = api_instance.index_moxa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_moxa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_moxa_get:\n") pprint(api_response) except Exception as e: @@ -40261,8 +39694,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -40294,7 +39726,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_mozilla_get** -> RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination index_mozilla_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMozillaAdvisoryPaginatePagination index_mozilla_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"mozilla\" @@ -40359,8 +39791,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -40370,7 +39801,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"mozilla\" - api_response = api_instance.index_mozilla_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_mozilla_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_mozilla_get:\n") pprint(api_response) except Exception as e: @@ -40401,8 +39832,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -40434,7 +39864,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_naver_get** -> RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination index_naver_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNaverPaginatePagination index_naver_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"naver\" @@ -40499,8 +39929,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -40510,7 +39939,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"naver\" - api_response = api_instance.index_naver_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_naver_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_naver_get:\n") pprint(api_response) except Exception as e: @@ -40541,8 +39970,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -40574,7 +40002,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ncsc_cves_get** -> RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination index_ncsc_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNCSCCVEPaginatePagination index_ncsc_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ncsc-cves\" @@ -40639,8 +40067,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -40650,7 +40077,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ncsc-cves\" - api_response = api_instance.index_ncsc_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ncsc_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ncsc_cves_get:\n") pprint(api_response) except Exception as e: @@ -40681,8 +40108,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -40714,7 +40140,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ncsc_get** -> RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination index_ncsc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNCSCPaginatePagination index_ncsc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ncsc\" @@ -40779,8 +40205,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -40790,7 +40215,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ncsc\" - api_response = api_instance.index_ncsc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ncsc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ncsc_get:\n") pprint(api_response) except Exception as e: @@ -40821,8 +40246,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -40854,7 +40278,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nec_get** -> RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination index_nec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNECPaginatePagination index_nec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nec\" @@ -40919,8 +40343,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -40930,7 +40353,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nec\" - api_response = api_instance.index_nec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nec_get:\n") pprint(api_response) except Exception as e: @@ -40961,8 +40384,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -40994,7 +40416,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nessus_get** -> RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination index_nessus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNessusPaginatePagination index_nessus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nessus\" @@ -41059,8 +40481,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -41070,7 +40491,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nessus\" - api_response = api_instance.index_nessus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nessus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nessus_get:\n") pprint(api_response) except Exception as e: @@ -41101,8 +40522,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -41134,7 +40554,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_netapp_get** -> RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination index_netapp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNetAppPaginatePagination index_netapp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"netapp\" @@ -41199,8 +40619,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -41210,7 +40629,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"netapp\" - api_response = api_instance.index_netapp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_netapp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_netapp_get:\n") pprint(api_response) except Exception as e: @@ -41241,8 +40660,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -41274,7 +40692,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_netatalk_get** -> RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination index_netatalk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNetatalkPaginatePagination index_netatalk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"netatalk\" @@ -41339,8 +40757,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -41350,7 +40767,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"netatalk\" - api_response = api_instance.index_netatalk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_netatalk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_netatalk_get:\n") pprint(api_response) except Exception as e: @@ -41381,8 +40798,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -41414,7 +40830,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_netgate_get** -> RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination index_netgate_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNetgatePaginatePagination index_netgate_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"netgate\" @@ -41479,8 +40895,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -41490,7 +40905,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"netgate\" - api_response = api_instance.index_netgate_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_netgate_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_netgate_get:\n") pprint(api_response) except Exception as e: @@ -41521,8 +40936,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -41554,7 +40968,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_netgear_get** -> RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination index_netgear_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNetgearPaginatePagination index_netgear_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"netgear\" @@ -41619,8 +41033,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -41630,7 +41043,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"netgear\" - api_response = api_instance.index_netgear_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_netgear_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_netgear_get:\n") pprint(api_response) except Exception as e: @@ -41661,8 +41074,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -41694,7 +41106,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_netskope_get** -> RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination index_netskope_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNetskopePaginatePagination index_netskope_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"netskope\" @@ -41759,8 +41171,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -41770,7 +41181,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"netskope\" - api_response = api_instance.index_netskope_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_netskope_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_netskope_get:\n") pprint(api_response) except Exception as e: @@ -41801,8 +41212,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -41834,7 +41244,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nexpose_get** -> RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination index_nexpose_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNexposePaginatePagination index_nexpose_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nexpose\" @@ -41899,8 +41309,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -41910,7 +41319,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nexpose\" - api_response = api_instance.index_nexpose_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nexpose_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nexpose_get:\n") pprint(api_response) except Exception as e: @@ -41941,8 +41350,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -41974,7 +41382,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nginx_get** -> RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination index_nginx_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNginxAdvisoryPaginatePagination index_nginx_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nginx\" @@ -42039,8 +41447,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -42050,7 +41457,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nginx\" - api_response = api_instance.index_nginx_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nginx_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nginx_get:\n") pprint(api_response) except Exception as e: @@ -42081,8 +41488,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -42114,7 +41520,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nhs_get** -> RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination index_nhs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNHSPaginatePagination index_nhs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nhs\" @@ -42179,8 +41585,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -42190,7 +41595,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nhs\" - api_response = api_instance.index_nhs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nhs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nhs_get:\n") pprint(api_response) except Exception as e: @@ -42221,8 +41626,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -42254,7 +41658,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ni_get** -> RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination index_ni_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNIPaginatePagination index_ni_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ni\" @@ -42319,8 +41723,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -42330,7 +41733,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ni\" - api_response = api_instance.index_ni_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ni_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ni_get:\n") pprint(api_response) except Exception as e: @@ -42361,8 +41764,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -42394,7 +41796,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nist_nvd2_cpematch_get** -> RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination index_nist_nvd2_cpematch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiNVD20CPEMatchPaginatePagination index_nist_nvd2_cpematch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nist-nvd2-cpematch\" @@ -42459,8 +41861,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -42470,7 +41871,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nist-nvd2-cpematch\" - api_response = api_instance.index_nist_nvd2_cpematch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nist_nvd2_cpematch_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nist_nvd2_cpematch_get:\n") pprint(api_response) except Exception as e: @@ -42501,8 +41902,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -42534,7 +41934,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nist_nvd2_get** -> RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination index_nist_nvd2_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiNVD20CVEPaginatePagination index_nist_nvd2_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nist-nvd2\" @@ -42599,8 +41999,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -42610,7 +42009,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nist-nvd2\" - api_response = api_instance.index_nist_nvd2_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nist_nvd2_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nist_nvd2_get:\n") pprint(api_response) except Exception as e: @@ -42641,8 +42040,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -42674,7 +42072,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nist_nvd2_sources_get** -> RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination index_nist_nvd2_sources_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNVD20SourcePaginatePagination index_nist_nvd2_sources_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nist-nvd2-sources\" @@ -42739,8 +42137,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -42750,7 +42147,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nist-nvd2-sources\" - api_response = api_instance.index_nist_nvd2_sources_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nist_nvd2_sources_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nist_nvd2_sources_get:\n") pprint(api_response) except Exception as e: @@ -42781,8 +42178,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -42814,7 +42210,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nist_nvd_get** -> RenderResponseWithMetadataArrayApiCveItemsPaginatePagination index_nist_nvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiCveItemsPaginatePagination index_nist_nvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nist-nvd\" @@ -42879,8 +42275,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -42890,7 +42285,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nist-nvd\" - api_response = api_instance.index_nist_nvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nist_nvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nist_nvd_get:\n") pprint(api_response) except Exception as e: @@ -42921,8 +42316,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -42954,7 +42348,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_node_security_get** -> RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination index_node_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNodeSecurityPaginatePagination index_node_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"node-security\" @@ -43019,8 +42413,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -43030,7 +42423,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"node-security\" - api_response = api_instance.index_node_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_node_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_node_security_get:\n") pprint(api_response) except Exception as e: @@ -43061,8 +42454,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -43094,7 +42486,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nodejs_get** -> RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination index_nodejs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNodeJSPaginatePagination index_nodejs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nodejs\" @@ -43159,8 +42551,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -43170,7 +42561,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nodejs\" - api_response = api_instance.index_nodejs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nodejs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nodejs_get:\n") pprint(api_response) except Exception as e: @@ -43201,8 +42592,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -43234,7 +42624,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nokia_get** -> RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination index_nokia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNokiaPaginatePagination index_nokia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nokia\" @@ -43299,8 +42689,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -43310,7 +42699,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nokia\" - api_response = api_instance.index_nokia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nokia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nokia_get:\n") pprint(api_response) except Exception as e: @@ -43341,8 +42730,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -43374,7 +42762,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_notepadplusplus_get** -> RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination index_notepadplusplus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNotePadPlusPlusPaginatePagination index_notepadplusplus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"notepadplusplus\" @@ -43439,8 +42827,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -43450,7 +42837,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"notepadplusplus\" - api_response = api_instance.index_notepadplusplus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_notepadplusplus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_notepadplusplus_get:\n") pprint(api_response) except Exception as e: @@ -43481,8 +42868,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -43514,7 +42900,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nozomi_get** -> RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination index_nozomi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNozomiPaginatePagination index_nozomi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nozomi\" @@ -43579,8 +42965,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -43590,7 +42975,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nozomi\" - api_response = api_instance.index_nozomi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nozomi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nozomi_get:\n") pprint(api_response) except Exception as e: @@ -43621,8 +43006,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -43654,7 +43038,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_npm_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_npm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_npm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"npm\" @@ -43719,8 +43103,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -43730,7 +43113,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"npm\" - api_response = api_instance.index_npm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_npm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_npm_get:\n") pprint(api_response) except Exception as e: @@ -43761,8 +43144,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -43794,7 +43176,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ntp_get** -> RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination index_ntp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNTPPaginatePagination index_ntp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ntp\" @@ -43859,8 +43241,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -43870,7 +43251,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ntp\" - api_response = api_instance.index_ntp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ntp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ntp_get:\n") pprint(api_response) except Exception as e: @@ -43901,8 +43282,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -43934,7 +43314,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nuclei_get** -> RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination index_nuclei_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNucleiPaginatePagination index_nuclei_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nuclei\" @@ -43999,8 +43379,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -44010,7 +43389,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nuclei\" - api_response = api_instance.index_nuclei_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nuclei_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nuclei_get:\n") pprint(api_response) except Exception as e: @@ -44041,8 +43420,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -44074,7 +43452,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nuget_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_nuget_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_nuget_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nuget\" @@ -44139,8 +43517,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -44150,7 +43527,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nuget\" - api_response = api_instance.index_nuget_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nuget_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nuget_get:\n") pprint(api_response) except Exception as e: @@ -44181,8 +43558,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -44214,7 +43590,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nvd_cpe_dictionary_get** -> RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination index_nvd_cpe_dictionary_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNVDCPEDictionaryPaginatePagination index_nvd_cpe_dictionary_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nvd-cpe-dictionary\" @@ -44279,8 +43655,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -44290,7 +43665,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nvd-cpe-dictionary\" - api_response = api_instance.index_nvd_cpe_dictionary_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nvd_cpe_dictionary_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nvd_cpe_dictionary_get:\n") pprint(api_response) except Exception as e: @@ -44321,8 +43696,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -44354,7 +43728,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nvidia_get** -> RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination index_nvidia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySecurityBulletinPaginatePagination index_nvidia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nvidia\" @@ -44419,8 +43793,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -44430,7 +43803,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nvidia\" - api_response = api_instance.index_nvidia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nvidia_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nvidia_get:\n") pprint(api_response) except Exception as e: @@ -44461,8 +43834,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -44494,7 +43866,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_nz_advisories_get** -> RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination index_nz_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryNZAdvisoryPaginatePagination index_nz_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"nz-advisories\" @@ -44559,8 +43931,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -44570,7 +43941,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"nz-advisories\" - api_response = api_instance.index_nz_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_nz_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_nz_advisories_get:\n") pprint(api_response) except Exception as e: @@ -44601,8 +43972,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -44634,7 +44004,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_octopus_deploy_get** -> RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination index_octopus_deploy_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOctopusDeployPaginatePagination index_octopus_deploy_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"octopus-deploy\" @@ -44699,8 +44069,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -44710,7 +44079,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"octopus-deploy\" - api_response = api_instance.index_octopus_deploy_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_octopus_deploy_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_octopus_deploy_get:\n") pprint(api_response) except Exception as e: @@ -44741,8 +44110,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -44774,7 +44142,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_okta_get** -> RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination index_okta_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOktaPaginatePagination index_okta_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"okta\" @@ -44839,8 +44207,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -44850,7 +44217,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"okta\" - api_response = api_instance.index_okta_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_okta_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_okta_get:\n") pprint(api_response) except Exception as e: @@ -44881,8 +44248,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -44914,7 +44280,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_omron_get** -> RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination index_omron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOmronPaginatePagination index_omron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"omron\" @@ -44979,8 +44345,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -44990,7 +44355,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"omron\" - api_response = api_instance.index_omron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_omron_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_omron_get:\n") pprint(api_response) except Exception as e: @@ -45021,8 +44386,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -45054,7 +44418,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_one_e_get** -> RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination index_one_e_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOneEPaginatePagination index_one_e_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"one-e\" @@ -45119,8 +44483,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -45130,7 +44493,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"one-e\" - api_response = api_instance.index_one_e_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_one_e_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_one_e_get:\n") pprint(api_response) except Exception as e: @@ -45161,8 +44524,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -45194,7 +44556,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_opam_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_opam_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_opam_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"opam\" @@ -45259,8 +44621,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -45270,7 +44631,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"opam\" - api_response = api_instance.index_opam_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_opam_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_opam_get:\n") pprint(api_response) except Exception as e: @@ -45301,8 +44662,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -45334,7 +44694,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_open_cvdb_get** -> RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination index_open_cvdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOpenCVDBPaginatePagination index_open_cvdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"open-cvdb\" @@ -45399,8 +44759,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -45410,7 +44769,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"open-cvdb\" - api_response = api_instance.index_open_cvdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_open_cvdb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_open_cvdb_get:\n") pprint(api_response) except Exception as e: @@ -45441,8 +44800,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -45474,7 +44832,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_openbsd_get** -> RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination index_openbsd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOpenBSDPaginatePagination index_openbsd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"openbsd\" @@ -45539,8 +44897,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -45550,7 +44907,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"openbsd\" - api_response = api_instance.index_openbsd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_openbsd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_openbsd_get:\n") pprint(api_response) except Exception as e: @@ -45581,8 +44938,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -45614,7 +44970,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_opengear_get** -> RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination index_opengear_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOpengearPaginatePagination index_opengear_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"opengear\" @@ -45679,8 +45035,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -45690,7 +45045,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"opengear\" - api_response = api_instance.index_opengear_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_opengear_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_opengear_get:\n") pprint(api_response) except Exception as e: @@ -45721,8 +45076,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -45754,7 +45108,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_openjdk_get** -> RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination index_openjdk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOpenJDKPaginatePagination index_openjdk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"openjdk\" @@ -45819,8 +45173,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -45830,7 +45183,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"openjdk\" - api_response = api_instance.index_openjdk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_openjdk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_openjdk_get:\n") pprint(api_response) except Exception as e: @@ -45861,8 +45214,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -45894,7 +45246,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_openssh_get** -> RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination index_openssh_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOpenSSHPaginatePagination index_openssh_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"openssh\" @@ -45959,8 +45311,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -45970,7 +45321,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"openssh\" - api_response = api_instance.index_openssh_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_openssh_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_openssh_get:\n") pprint(api_response) except Exception as e: @@ -46001,8 +45352,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -46034,7 +45384,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_openssl_secadv_get** -> RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination index_openssl_secadv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOpenSSLSecAdvPaginatePagination index_openssl_secadv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"openssl-secadv\" @@ -46099,8 +45449,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -46110,7 +45459,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"openssl-secadv\" - api_response = api_instance.index_openssl_secadv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_openssl_secadv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_openssl_secadv_get:\n") pprint(api_response) except Exception as e: @@ -46141,8 +45490,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -46174,7 +45522,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_openstack_get** -> RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination index_openstack_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOpenStackPaginatePagination index_openstack_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"openstack\" @@ -46239,8 +45587,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -46250,7 +45597,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"openstack\" - api_response = api_instance.index_openstack_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_openstack_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_openstack_get:\n") pprint(api_response) except Exception as e: @@ -46281,8 +45628,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -46314,7 +45660,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_openwrt_get** -> RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination index_openwrt_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWRTPaginatePagination index_openwrt_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"openwrt\" @@ -46379,8 +45725,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -46390,7 +45735,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"openwrt\" - api_response = api_instance.index_openwrt_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_openwrt_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_openwrt_get:\n") pprint(api_response) except Exception as e: @@ -46421,8 +45766,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -46454,7 +45798,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_oracle_cpu_csaf_get** -> RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination index_oracle_cpu_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOracleCPUCSAFPaginatePagination index_oracle_cpu_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"oracle-cpu-csaf\" @@ -46519,8 +45863,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -46530,7 +45873,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"oracle-cpu-csaf\" - api_response = api_instance.index_oracle_cpu_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_oracle_cpu_csaf_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_oracle_cpu_csaf_get:\n") pprint(api_response) except Exception as e: @@ -46561,8 +45904,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -46594,7 +45936,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_oracle_cpu_get** -> RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination index_oracle_cpu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOracleCPUPaginatePagination index_oracle_cpu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"oracle-cpu\" @@ -46659,8 +46001,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -46670,7 +46011,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"oracle-cpu\" - api_response = api_instance.index_oracle_cpu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_oracle_cpu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_oracle_cpu_get:\n") pprint(api_response) except Exception as e: @@ -46701,8 +46042,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -46734,7 +46074,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_oracle_get** -> RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination index_oracle_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryMetaDataPaginatePagination index_oracle_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"oracle\" @@ -46799,8 +46139,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -46810,7 +46149,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"oracle\" - api_response = api_instance.index_oracle_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_oracle_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_oracle_get:\n") pprint(api_response) except Exception as e: @@ -46841,8 +46180,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -46874,7 +46212,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_osv_get** -> RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination index_osv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOSVPaginatePagination index_osv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"osv\" @@ -46939,8 +46277,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -46950,7 +46287,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"osv\" - api_response = api_instance.index_osv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_osv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_osv_get:\n") pprint(api_response) except Exception as e: @@ -46981,8 +46318,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -47014,7 +46350,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_otrs_get** -> RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination index_otrs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOTRSPaginatePagination index_otrs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"otrs\" @@ -47079,8 +46415,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -47090,7 +46425,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"otrs\" - api_response = api_instance.index_otrs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_otrs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_otrs_get:\n") pprint(api_response) except Exception as e: @@ -47121,8 +46456,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -47154,7 +46488,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_owncloud_get** -> RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination index_owncloud_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryOwnCloudPaginatePagination index_owncloud_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"owncloud\" @@ -47219,8 +46553,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -47230,7 +46563,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"owncloud\" - api_response = api_instance.index_owncloud_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_owncloud_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_owncloud_get:\n") pprint(api_response) except Exception as e: @@ -47261,8 +46594,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -47294,7 +46626,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_packetstorm_get** -> RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination index_packetstorm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPacketstormExploitPaginatePagination index_packetstorm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"packetstorm\" @@ -47359,8 +46691,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -47370,7 +46701,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"packetstorm\" - api_response = api_instance.index_packetstorm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_packetstorm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_packetstorm_get:\n") pprint(api_response) except Exception as e: @@ -47401,8 +46732,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -47434,7 +46764,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_palantir_get** -> RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination index_palantir_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPalantirPaginatePagination index_palantir_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"palantir\" @@ -47499,8 +46829,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -47510,7 +46839,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"palantir\" - api_response = api_instance.index_palantir_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_palantir_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_palantir_get:\n") pprint(api_response) except Exception as e: @@ -47541,8 +46870,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -47574,7 +46902,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_palo_alto_get** -> RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination index_palo_alto_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPaloAltoAdvisoryPaginatePagination index_palo_alto_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"palo-alto\" @@ -47639,8 +46967,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -47650,7 +46977,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"palo-alto\" - api_response = api_instance.index_palo_alto_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_palo_alto_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_palo_alto_get:\n") pprint(api_response) except Exception as e: @@ -47681,8 +47008,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -47714,7 +47040,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_panasonic_get** -> RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination index_panasonic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPanasonicPaginatePagination index_panasonic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"panasonic\" @@ -47779,8 +47105,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -47790,7 +47115,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"panasonic\" - api_response = api_instance.index_panasonic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_panasonic_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_panasonic_get:\n") pprint(api_response) except Exception as e: @@ -47821,8 +47146,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -47854,7 +47178,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_papercut_get** -> RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination index_papercut_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPaperCutPaginatePagination index_papercut_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"papercut\" @@ -47919,8 +47243,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -47930,7 +47253,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"papercut\" - api_response = api_instance.index_papercut_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_papercut_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_papercut_get:\n") pprint(api_response) except Exception as e: @@ -47961,8 +47284,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -47994,7 +47316,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_pega_get** -> RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination index_pega_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPegaPaginatePagination index_pega_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"pega\" @@ -48059,8 +47381,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -48070,7 +47391,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"pega\" - api_response = api_instance.index_pega_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_pega_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_pega_get:\n") pprint(api_response) except Exception as e: @@ -48101,8 +47422,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -48134,7 +47454,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_philips_get** -> RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination index_philips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPhilipsAdvisoryPaginatePagination index_philips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"philips\" @@ -48199,8 +47519,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -48210,7 +47529,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"philips\" - api_response = api_instance.index_philips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_philips_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_philips_get:\n") pprint(api_response) except Exception as e: @@ -48241,8 +47560,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -48274,7 +47592,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_phoenix_contact_get** -> RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination index_phoenix_contact_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPhoenixContactAdvisoryPaginatePagination index_phoenix_contact_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"phoenix-contact\" @@ -48339,8 +47657,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -48350,7 +47667,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"phoenix-contact\" - api_response = api_instance.index_phoenix_contact_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_phoenix_contact_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_phoenix_contact_get:\n") pprint(api_response) except Exception as e: @@ -48381,8 +47698,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -48414,7 +47730,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_php_my_admin_get** -> RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination index_php_my_admin_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPHPMyAdminPaginatePagination index_php_my_admin_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"php-my-admin\" @@ -48479,8 +47795,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -48490,7 +47805,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"php-my-admin\" - api_response = api_instance.index_php_my_admin_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_php_my_admin_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_php_my_admin_get:\n") pprint(api_response) except Exception as e: @@ -48521,8 +47836,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -48554,7 +47868,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_pkcert_get** -> RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination index_pkcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPKCertPaginatePagination index_pkcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"pkcert\" @@ -48619,8 +47933,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -48630,7 +47943,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"pkcert\" - api_response = api_instance.index_pkcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_pkcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_pkcert_get:\n") pprint(api_response) except Exception as e: @@ -48661,8 +47974,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -48694,7 +48006,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_postgressql_get** -> RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination index_postgressql_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPostgresSQLPaginatePagination index_postgressql_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"postgressql\" @@ -48759,8 +48071,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -48770,7 +48081,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"postgressql\" - api_response = api_instance.index_postgressql_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_postgressql_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_postgressql_get:\n") pprint(api_response) except Exception as e: @@ -48801,8 +48112,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -48834,7 +48144,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_powerdns_get** -> RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination index_powerdns_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPowerDNSPaginatePagination index_powerdns_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"powerdns\" @@ -48899,8 +48209,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -48910,7 +48219,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"powerdns\" - api_response = api_instance.index_powerdns_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_powerdns_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_powerdns_get:\n") pprint(api_response) except Exception as e: @@ -48941,8 +48250,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -48974,7 +48282,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_progress_get** -> RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination index_progress_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryProgressPaginatePagination index_progress_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"progress\" @@ -49039,8 +48347,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -49050,7 +48357,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"progress\" - api_response = api_instance.index_progress_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_progress_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_progress_get:\n") pprint(api_response) except Exception as e: @@ -49081,8 +48388,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -49114,7 +48420,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_proofpoint_get** -> RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination index_proofpoint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryProofpointPaginatePagination index_proofpoint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"proofpoint\" @@ -49179,8 +48485,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -49190,7 +48495,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"proofpoint\" - api_response = api_instance.index_proofpoint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_proofpoint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_proofpoint_get:\n") pprint(api_response) except Exception as e: @@ -49221,8 +48526,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -49254,7 +48558,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ptc_get** -> RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination index_ptc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPTCPaginatePagination index_ptc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ptc\" @@ -49319,8 +48623,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -49330,7 +48633,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ptc\" - api_response = api_instance.index_ptc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ptc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ptc_get:\n") pprint(api_response) except Exception as e: @@ -49361,8 +48664,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -49394,7 +48696,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_pub_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_pub_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_pub_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"pub\" @@ -49459,8 +48761,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -49470,7 +48771,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"pub\" - api_response = api_instance.index_pub_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_pub_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_pub_get:\n") pprint(api_response) except Exception as e: @@ -49501,8 +48802,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -49534,7 +48834,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_pure_storage_get** -> RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination index_pure_storage_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPureStoragePaginatePagination index_pure_storage_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"pure-storage\" @@ -49599,8 +48899,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -49610,7 +48909,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"pure-storage\" - api_response = api_instance.index_pure_storage_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_pure_storage_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_pure_storage_get:\n") pprint(api_response) except Exception as e: @@ -49641,8 +48940,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -49674,7 +48972,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_pypa_advisories_get** -> RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination index_pypa_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryPyPAAdvisoryPaginatePagination index_pypa_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"pypa-advisories\" @@ -49739,8 +49037,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -49750,7 +49047,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"pypa-advisories\" - api_response = api_instance.index_pypa_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_pypa_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_pypa_advisories_get:\n") pprint(api_response) except Exception as e: @@ -49781,8 +49078,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -49814,7 +49110,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_pypi_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_pypi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_pypi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"pypi\" @@ -49879,8 +49175,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -49890,7 +49185,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"pypi\" - api_response = api_instance.index_pypi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_pypi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_pypi_get:\n") pprint(api_response) except Exception as e: @@ -49921,8 +49216,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -49954,7 +49248,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_qnap_get** -> RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination index_qnap_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryQNAPAdvisoryPaginatePagination index_qnap_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"qnap\" @@ -50019,8 +49313,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -50030,7 +49323,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"qnap\" - api_response = api_instance.index_qnap_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_qnap_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_qnap_get:\n") pprint(api_response) except Exception as e: @@ -50061,8 +49354,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -50094,7 +49386,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_qqids_get** -> RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination index_qqids_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryQQIDPaginatePagination index_qqids_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"qqids\" @@ -50159,8 +49451,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -50170,7 +49461,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"qqids\" - api_response = api_instance.index_qqids_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_qqids_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_qqids_get:\n") pprint(api_response) except Exception as e: @@ -50201,8 +49492,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -50234,7 +49524,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_qualcomm_get** -> RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination index_qualcomm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryQualcommPaginatePagination index_qualcomm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"qualcomm\" @@ -50299,8 +49589,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -50310,7 +49599,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"qualcomm\" - api_response = api_instance.index_qualcomm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_qualcomm_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_qualcomm_get:\n") pprint(api_response) except Exception as e: @@ -50341,8 +49630,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -50374,7 +49662,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_qualys_get** -> RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination index_qualys_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryQualysPaginatePagination index_qualys_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"qualys\" @@ -50439,8 +49727,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -50450,7 +49737,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"qualys\" - api_response = api_instance.index_qualys_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_qualys_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_qualys_get:\n") pprint(api_response) except Exception as e: @@ -50481,8 +49768,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -50514,7 +49800,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_qualys_qids_get** -> RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination index_qualys_qids_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryQualysQIDPaginatePagination index_qualys_qids_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"qualys-qids\" @@ -50579,8 +49865,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -50590,7 +49875,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"qualys-qids\" - api_response = api_instance.index_qualys_qids_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_qualys_qids_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_qualys_qids_get:\n") pprint(api_response) except Exception as e: @@ -50621,8 +49906,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -50654,7 +49938,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_qubes_qsb_get** -> RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination index_qubes_qsb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryQSBPaginatePagination index_qubes_qsb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"qubes-qsb\" @@ -50719,8 +50003,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -50730,7 +50013,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"qubes-qsb\" - api_response = api_instance.index_qubes_qsb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_qubes_qsb_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_qubes_qsb_get:\n") pprint(api_response) except Exception as e: @@ -50761,8 +50044,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -50794,7 +50076,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ransomware_get** -> RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination index_ransomware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRansomwareExploitPaginatePagination index_ransomware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ransomware\" @@ -50859,8 +50141,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -50870,7 +50151,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ransomware\" - api_response = api_instance.index_ransomware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ransomware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ransomware_get:\n") pprint(api_response) except Exception as e: @@ -50901,8 +50182,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -50934,7 +50214,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_red_lion_get** -> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination index_red_lion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRedLionPaginatePagination index_red_lion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"red-lion\" @@ -50999,8 +50279,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -51010,7 +50289,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"red-lion\" - api_response = api_instance.index_red_lion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_red_lion_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_red_lion_get:\n") pprint(api_response) except Exception as e: @@ -51041,8 +50320,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -51074,7 +50352,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_redhat_cves_get** -> RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination index_redhat_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRhelCVEPaginatePagination index_redhat_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"redhat-cves\" @@ -51139,8 +50417,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -51150,7 +50427,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"redhat-cves\" - api_response = api_instance.index_redhat_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_redhat_cves_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_redhat_cves_get:\n") pprint(api_response) except Exception as e: @@ -51181,8 +50458,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -51214,7 +50490,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_redhat_get** -> RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination index_redhat_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRedhatCVEPaginatePagination index_redhat_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"redhat\" @@ -51279,8 +50555,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -51290,7 +50565,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"redhat\" - api_response = api_instance.index_redhat_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_redhat_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_redhat_get:\n") pprint(api_response) except Exception as e: @@ -51321,8 +50596,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -51354,7 +50628,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_renesas_get** -> RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination index_renesas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRenesasPaginatePagination index_renesas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"renesas\" @@ -51419,8 +50693,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -51430,7 +50703,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"renesas\" - api_response = api_instance.index_renesas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_renesas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_renesas_get:\n") pprint(api_response) except Exception as e: @@ -51461,8 +50734,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -51494,7 +50766,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_revive_get** -> RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination index_revive_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRevivePaginatePagination index_revive_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"revive\" @@ -51559,8 +50831,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -51570,7 +50841,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"revive\" - api_response = api_instance.index_revive_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_revive_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_revive_get:\n") pprint(api_response) except Exception as e: @@ -51601,8 +50872,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -51634,7 +50904,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_roche_get** -> RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination index_roche_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRochePaginatePagination index_roche_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"roche\" @@ -51699,8 +50969,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -51710,7 +50979,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"roche\" - api_response = api_instance.index_roche_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_roche_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_roche_get:\n") pprint(api_response) except Exception as e: @@ -51741,8 +51010,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -51774,7 +51042,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_rockwell_get** -> RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination index_rockwell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRockwellPaginatePagination index_rockwell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"rockwell\" @@ -51839,8 +51107,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -51850,7 +51117,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"rockwell\" - api_response = api_instance.index_rockwell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_rockwell_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_rockwell_get:\n") pprint(api_response) except Exception as e: @@ -51881,8 +51148,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -51914,7 +51180,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_rocky_errata_get** -> RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination index_rocky_errata_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRockyErrataPaginatePagination index_rocky_errata_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"rocky-errata\" @@ -51979,8 +51245,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -51990,7 +51255,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"rocky-errata\" - api_response = api_instance.index_rocky_errata_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_rocky_errata_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_rocky_errata_get:\n") pprint(api_response) except Exception as e: @@ -52021,8 +51286,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -52054,7 +51318,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_rocky_get** -> RenderResponseWithMetadataArrayApiUpdatePaginatePagination index_rocky_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiUpdatePaginatePagination index_rocky_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"rocky\" @@ -52119,8 +51383,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -52130,7 +51393,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"rocky\" - api_response = api_instance.index_rocky_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_rocky_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_rocky_get:\n") pprint(api_response) except Exception as e: @@ -52161,8 +51424,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -52194,7 +51456,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_rocky_purls_get** -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination index_rocky_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination index_rocky_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"rocky-purls\" @@ -52259,8 +51521,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -52270,7 +51531,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"rocky-purls\" - api_response = api_instance.index_rocky_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_rocky_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_rocky_purls_get:\n") pprint(api_response) except Exception as e: @@ -52301,8 +51562,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -52334,7 +51594,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_rsync_get** -> RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination index_rsync_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRsyncPaginatePagination index_rsync_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"rsync\" @@ -52399,8 +51659,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -52410,7 +51669,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"rsync\" - api_response = api_instance.index_rsync_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_rsync_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_rsync_get:\n") pprint(api_response) except Exception as e: @@ -52441,8 +51700,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -52474,7 +51732,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ruckus_get** -> RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination index_ruckus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRuckusPaginatePagination index_ruckus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ruckus\" @@ -52539,8 +51797,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -52550,7 +51807,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ruckus\" - api_response = api_instance.index_ruckus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ruckus_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ruckus_get:\n") pprint(api_response) except Exception as e: @@ -52581,8 +51838,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -52614,7 +51870,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_rustsec_advisories_get** -> RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination index_rustsec_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryRustsecAdvisoryPaginatePagination index_rustsec_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"rustsec-advisories\" @@ -52679,8 +51935,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -52690,7 +51945,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"rustsec-advisories\" - api_response = api_instance.index_rustsec_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_rustsec_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_rustsec_advisories_get:\n") pprint(api_response) except Exception as e: @@ -52721,8 +51976,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -52754,7 +52008,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sacert_get** -> RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination index_sacert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySAAdvisoryPaginatePagination index_sacert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sacert\" @@ -52819,8 +52073,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -52830,7 +52083,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sacert\" - api_response = api_instance.index_sacert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sacert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sacert_get:\n") pprint(api_response) except Exception as e: @@ -52861,8 +52114,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -52894,7 +52146,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_safran_get** -> RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination index_safran_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySafranPaginatePagination index_safran_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"safran\" @@ -52959,8 +52211,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -52970,7 +52221,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"safran\" - api_response = api_instance.index_safran_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_safran_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_safran_get:\n") pprint(api_response) except Exception as e: @@ -53001,8 +52252,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -53034,7 +52284,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_saint_get** -> RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination index_saint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySaintExploitPaginatePagination index_saint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"saint\" @@ -53099,8 +52349,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -53110,7 +52359,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"saint\" - api_response = api_instance.index_saint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_saint_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_saint_get:\n") pprint(api_response) except Exception as e: @@ -53141,8 +52390,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -53174,7 +52422,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_salesforce_get** -> RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination index_salesforce_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySalesForcePaginatePagination index_salesforce_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"salesforce\" @@ -53239,8 +52487,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -53250,7 +52497,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"salesforce\" - api_response = api_instance.index_salesforce_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_salesforce_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_salesforce_get:\n") pprint(api_response) except Exception as e: @@ -53281,8 +52528,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -53314,7 +52560,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_samba_get** -> RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination index_samba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySambaPaginatePagination index_samba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"samba\" @@ -53379,8 +52625,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -53390,7 +52635,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"samba\" - api_response = api_instance.index_samba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_samba_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_samba_get:\n") pprint(api_response) except Exception as e: @@ -53421,8 +52666,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -53454,7 +52698,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sandisk_get** -> RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination index_sandisk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySandiskPaginatePagination index_sandisk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sandisk\" @@ -53519,8 +52763,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -53530,7 +52773,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sandisk\" - api_response = api_instance.index_sandisk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sandisk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sandisk_get:\n") pprint(api_response) except Exception as e: @@ -53561,8 +52804,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -53594,7 +52836,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sans_dshield_get** -> RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination index_sans_dshield_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySansDshieldPaginatePagination index_sans_dshield_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sans-dshield\" @@ -53659,8 +52901,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -53670,7 +52911,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sans-dshield\" - api_response = api_instance.index_sans_dshield_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sans_dshield_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sans_dshield_get:\n") pprint(api_response) except Exception as e: @@ -53701,8 +52942,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -53734,7 +52974,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sap_get** -> RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination index_sap_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySAPPaginatePagination index_sap_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sap\" @@ -53799,8 +53039,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -53810,7 +53049,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sap\" - api_response = api_instance.index_sap_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sap_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sap_get:\n") pprint(api_response) except Exception as e: @@ -53841,8 +53080,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -53874,7 +53112,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_schneider_electric_get** -> RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination index_schneider_electric_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySchneiderElectricAdvisoryPaginatePagination index_schneider_electric_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"schneider-electric\" @@ -53939,8 +53177,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -53950,7 +53187,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"schneider-electric\" - api_response = api_instance.index_schneider_electric_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_schneider_electric_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_schneider_electric_get:\n") pprint(api_response) except Exception as e: @@ -53981,8 +53218,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -54014,7 +53250,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_schutzwerk_get** -> RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination index_schutzwerk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySchutzwerkPaginatePagination index_schutzwerk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"schutzwerk\" @@ -54079,8 +53315,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -54090,7 +53325,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"schutzwerk\" - api_response = api_instance.index_schutzwerk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_schutzwerk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_schutzwerk_get:\n") pprint(api_response) except Exception as e: @@ -54121,8 +53356,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -54154,7 +53388,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sec_consult_get** -> RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination index_sec_consult_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySECConsultPaginatePagination index_sec_consult_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sec-consult\" @@ -54219,8 +53453,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -54230,7 +53463,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sec-consult\" - api_response = api_instance.index_sec_consult_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sec_consult_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sec_consult_get:\n") pprint(api_response) except Exception as e: @@ -54261,8 +53494,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -54294,7 +53526,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_securitylab_get** -> RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination index_securitylab_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySecurityLabPaginatePagination index_securitylab_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"securitylab\" @@ -54359,8 +53591,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -54370,7 +53601,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"securitylab\" - api_response = api_instance.index_securitylab_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_securitylab_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_securitylab_get:\n") pprint(api_response) except Exception as e: @@ -54401,8 +53632,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -54434,7 +53664,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_seebug_get** -> RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination index_seebug_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySeebugExploitPaginatePagination index_seebug_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"seebug\" @@ -54499,8 +53729,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -54510,7 +53739,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"seebug\" - api_response = api_instance.index_seebug_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_seebug_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_seebug_get:\n") pprint(api_response) except Exception as e: @@ -54541,8 +53770,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -54574,7 +53802,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sel_get** -> RenderResponseWithMetadataArrayAdvisorySelPaginatePagination index_sel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySelPaginatePagination index_sel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sel\" @@ -54639,8 +53867,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -54650,7 +53877,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sel\" - api_response = api_instance.index_sel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sel_get:\n") pprint(api_response) except Exception as e: @@ -54681,8 +53908,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -54714,7 +53940,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sentinelone_get** -> RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination index_sentinelone_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySentinelOnePaginatePagination index_sentinelone_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sentinelone\" @@ -54779,8 +54005,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -54790,7 +54015,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sentinelone\" - api_response = api_instance.index_sentinelone_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sentinelone_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sentinelone_get:\n") pprint(api_response) except Exception as e: @@ -54821,8 +54046,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -54854,7 +54078,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_servicenow_get** -> RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination index_servicenow_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryServiceNowPaginatePagination index_servicenow_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"servicenow\" @@ -54919,8 +54143,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -54930,7 +54153,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"servicenow\" - api_response = api_instance.index_servicenow_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_servicenow_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_servicenow_get:\n") pprint(api_response) except Exception as e: @@ -54961,8 +54184,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -54994,7 +54216,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_shadowserver_exploited_get** -> RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination index_shadowserver_exploited_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryShadowServerExploitedVulnerabilityPaginatePagination index_shadowserver_exploited_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"shadowserver-exploited\" @@ -55059,8 +54281,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -55070,7 +54291,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"shadowserver-exploited\" - api_response = api_instance.index_shadowserver_exploited_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_shadowserver_exploited_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_shadowserver_exploited_get:\n") pprint(api_response) except Exception as e: @@ -55101,8 +54322,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -55134,7 +54354,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_shielder_get** -> RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination index_shielder_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryShielderPaginatePagination index_shielder_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"shielder\" @@ -55199,8 +54419,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -55210,7 +54429,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"shielder\" - api_response = api_instance.index_shielder_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_shielder_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_shielder_get:\n") pprint(api_response) except Exception as e: @@ -55241,8 +54460,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -55274,7 +54492,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sick_get** -> RenderResponseWithMetadataArrayAdvisorySickPaginatePagination index_sick_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySickPaginatePagination index_sick_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sick\" @@ -55339,8 +54557,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -55350,7 +54567,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sick\" - api_response = api_instance.index_sick_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sick_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sick_get:\n") pprint(api_response) except Exception as e: @@ -55381,8 +54598,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -55414,7 +54630,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_siemens_get** -> RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination index_siemens_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySiemensAdvisoryPaginatePagination index_siemens_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"siemens\" @@ -55479,8 +54695,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -55490,7 +54705,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"siemens\" - api_response = api_instance.index_siemens_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_siemens_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_siemens_get:\n") pprint(api_response) except Exception as e: @@ -55521,8 +54736,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -55554,7 +54768,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sierra_wireless_get** -> RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination index_sierra_wireless_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySierraWirelessPaginatePagination index_sierra_wireless_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sierra-wireless\" @@ -55619,8 +54833,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -55630,7 +54843,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sierra-wireless\" - api_response = api_instance.index_sierra_wireless_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sierra_wireless_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sierra_wireless_get:\n") pprint(api_response) except Exception as e: @@ -55661,8 +54874,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -55694,7 +54906,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sigmahq_sigma_rules_get** -> RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination index_sigmahq_sigma_rules_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySigmaRulePaginatePagination index_sigmahq_sigma_rules_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sigmahq-sigma-rules\" @@ -55759,8 +54971,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -55770,7 +54981,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sigmahq-sigma-rules\" - api_response = api_instance.index_sigmahq_sigma_rules_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sigmahq_sigma_rules_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sigmahq_sigma_rules_get:\n") pprint(api_response) except Exception as e: @@ -55801,8 +55012,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -55834,7 +55044,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_singcert_get** -> RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination index_singcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySingCertPaginatePagination index_singcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"singcert\" @@ -55899,8 +55109,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -55910,7 +55119,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"singcert\" - api_response = api_instance.index_singcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_singcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_singcert_get:\n") pprint(api_response) except Exception as e: @@ -55941,8 +55150,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -55974,7 +55182,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sitecore_get** -> RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination index_sitecore_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySitecorePaginatePagination index_sitecore_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sitecore\" @@ -56039,8 +55247,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -56050,7 +55257,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sitecore\" - api_response = api_instance.index_sitecore_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sitecore_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sitecore_get:\n") pprint(api_response) except Exception as e: @@ -56081,8 +55288,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -56114,7 +55320,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_slackware_get** -> RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination index_slackware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySlackwarePaginatePagination index_slackware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"slackware\" @@ -56179,8 +55385,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -56190,7 +55395,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"slackware\" - api_response = api_instance.index_slackware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_slackware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_slackware_get:\n") pprint(api_response) except Exception as e: @@ -56221,8 +55426,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -56254,7 +55458,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_solarwinds_get** -> RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination index_solarwinds_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySolarWindsAdvisoryPaginatePagination index_solarwinds_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"solarwinds\" @@ -56319,8 +55523,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -56330,7 +55533,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"solarwinds\" - api_response = api_instance.index_solarwinds_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_solarwinds_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_solarwinds_get:\n") pprint(api_response) except Exception as e: @@ -56361,8 +55564,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -56394,7 +55596,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_solr_get** -> RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination index_solr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySolrPaginatePagination index_solr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"solr\" @@ -56459,8 +55661,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -56470,7 +55671,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"solr\" - api_response = api_instance.index_solr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_solr_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_solr_get:\n") pprint(api_response) except Exception as e: @@ -56501,8 +55702,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -56534,7 +55734,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sonatype_get** -> RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination index_sonatype_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySonatypePaginatePagination index_sonatype_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sonatype\" @@ -56599,8 +55799,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -56610,7 +55809,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sonatype\" - api_response = api_instance.index_sonatype_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sonatype_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sonatype_get:\n") pprint(api_response) except Exception as e: @@ -56641,8 +55840,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -56674,7 +55872,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sonicwall_get** -> RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination index_sonicwall_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySonicWallAdvisoryPaginatePagination index_sonicwall_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sonicwall\" @@ -56739,8 +55937,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -56750,7 +55947,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sonicwall\" - api_response = api_instance.index_sonicwall_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sonicwall_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sonicwall_get:\n") pprint(api_response) except Exception as e: @@ -56781,8 +55978,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -56814,7 +56010,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_spacelabs_healthcare_get** -> RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination index_spacelabs_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySpacelabsHealthcareAdvisoryPaginatePagination index_spacelabs_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"spacelabs-healthcare\" @@ -56879,8 +56075,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -56890,7 +56085,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"spacelabs-healthcare\" - api_response = api_instance.index_spacelabs_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_spacelabs_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_spacelabs_healthcare_get:\n") pprint(api_response) except Exception as e: @@ -56921,8 +56116,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -56954,7 +56148,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_splunk_get** -> RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination index_splunk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySplunkPaginatePagination index_splunk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"splunk\" @@ -57019,8 +56213,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -57030,7 +56223,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"splunk\" - api_response = api_instance.index_splunk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_splunk_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_splunk_get:\n") pprint(api_response) except Exception as e: @@ -57061,8 +56254,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -57094,7 +56286,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_spring_get** -> RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination index_spring_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySpringPaginatePagination index_spring_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"spring\" @@ -57159,8 +56351,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -57170,7 +56361,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"spring\" - api_response = api_instance.index_spring_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_spring_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_spring_get:\n") pprint(api_response) except Exception as e: @@ -57201,8 +56392,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -57234,7 +56424,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ssd_get** -> RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination index_ssd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySSDAdvisoryPaginatePagination index_ssd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ssd\" @@ -57299,8 +56489,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -57310,7 +56499,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ssd\" - api_response = api_instance.index_ssd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ssd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ssd_get:\n") pprint(api_response) except Exception as e: @@ -57341,8 +56530,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -57374,7 +56562,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_stormshield_get** -> RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination index_stormshield_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryStormshieldPaginatePagination index_stormshield_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"stormshield\" @@ -57439,8 +56627,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -57450,7 +56637,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"stormshield\" - api_response = api_instance.index_stormshield_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_stormshield_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_stormshield_get:\n") pprint(api_response) except Exception as e: @@ -57481,8 +56668,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -57514,7 +56700,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_stryker_get** -> RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination index_stryker_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryStrykerAdvisoryPaginatePagination index_stryker_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"stryker\" @@ -57579,8 +56765,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -57590,7 +56775,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"stryker\" - api_response = api_instance.index_stryker_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_stryker_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_stryker_get:\n") pprint(api_response) except Exception as e: @@ -57621,8 +56806,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -57654,7 +56838,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_sudo_get** -> RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination index_sudo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySudoPaginatePagination index_sudo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"sudo\" @@ -57719,8 +56903,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -57730,7 +56913,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"sudo\" - api_response = api_instance.index_sudo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_sudo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_sudo_get:\n") pprint(api_response) except Exception as e: @@ -57761,8 +56944,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -57794,7 +56976,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_suse_get** -> RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination index_suse_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryCvrfPaginatePagination index_suse_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"suse\" @@ -57859,8 +57041,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -57870,7 +57051,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"suse\" - api_response = api_instance.index_suse_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_suse_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_suse_get:\n") pprint(api_response) except Exception as e: @@ -57901,8 +57082,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -57934,7 +57114,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_suse_security_get** -> RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination index_suse_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySuseSecurityPaginatePagination index_suse_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"suse-security\" @@ -57999,8 +57179,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -58010,7 +57189,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"suse-security\" - api_response = api_instance.index_suse_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_suse_security_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_suse_security_get:\n") pprint(api_response) except Exception as e: @@ -58041,8 +57220,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -58074,7 +57252,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_swift_get** -> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_swift_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiOSSPackagePaginatePagination index_swift_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"swift\" @@ -58139,8 +57317,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -58150,7 +57327,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"swift\" - api_response = api_instance.index_swift_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_swift_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_swift_get:\n") pprint(api_response) except Exception as e: @@ -58181,8 +57358,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -58214,7 +57390,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_swisslog_healthcare_get** -> RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination index_swisslog_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySwisslogHealthcareAdvisoryPaginatePagination index_swisslog_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"swisslog-healthcare\" @@ -58279,8 +57455,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -58290,7 +57465,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"swisslog-healthcare\" - api_response = api_instance.index_swisslog_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_swisslog_healthcare_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_swisslog_healthcare_get:\n") pprint(api_response) except Exception as e: @@ -58321,8 +57496,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -58354,7 +57528,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_symfony_get** -> RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination index_symfony_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySymfonyPaginatePagination index_symfony_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"symfony\" @@ -58419,8 +57593,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -58430,7 +57603,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"symfony\" - api_response = api_instance.index_symfony_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_symfony_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_symfony_get:\n") pprint(api_response) except Exception as e: @@ -58461,8 +57634,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -58494,7 +57666,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_synacktiv_get** -> RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination index_synacktiv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySynacktivPaginatePagination index_synacktiv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"synacktiv\" @@ -58559,8 +57731,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -58570,7 +57741,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"synacktiv\" - api_response = api_instance.index_synacktiv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_synacktiv_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_synacktiv_get:\n") pprint(api_response) except Exception as e: @@ -58601,8 +57772,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -58634,7 +57804,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_syncrosoft_get** -> RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination index_syncrosoft_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySyncroSoftPaginatePagination index_syncrosoft_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"syncrosoft\" @@ -58699,8 +57869,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -58710,7 +57879,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"syncrosoft\" - api_response = api_instance.index_syncrosoft_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_syncrosoft_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_syncrosoft_get:\n") pprint(api_response) except Exception as e: @@ -58741,8 +57910,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -58774,7 +57942,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_synology_get** -> RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination index_synology_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySynologyPaginatePagination index_synology_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"synology\" @@ -58839,8 +58007,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -58850,7 +58017,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"synology\" - api_response = api_instance.index_synology_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_synology_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_synology_get:\n") pprint(api_response) except Exception as e: @@ -58881,8 +58048,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -58914,7 +58080,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_syss_get** -> RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination index_syss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisorySyssPaginatePagination index_syss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"syss\" @@ -58979,8 +58145,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -58990,7 +58155,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"syss\" - api_response = api_instance.index_syss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_syss_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_syss_get:\n") pprint(api_response) except Exception as e: @@ -59021,8 +58186,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -59054,7 +58218,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_tailscale_get** -> RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination index_tailscale_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTailscalePaginatePagination index_tailscale_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"tailscale\" @@ -59119,8 +58283,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -59130,7 +58293,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"tailscale\" - api_response = api_instance.index_tailscale_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_tailscale_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_tailscale_get:\n") pprint(api_response) except Exception as e: @@ -59161,8 +58324,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -59194,7 +58356,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_teamviewer_get** -> RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination index_teamviewer_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTeamViewerPaginatePagination index_teamviewer_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"teamviewer\" @@ -59259,8 +58421,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -59270,7 +58431,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"teamviewer\" - api_response = api_instance.index_teamviewer_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_teamviewer_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_teamviewer_get:\n") pprint(api_response) except Exception as e: @@ -59301,8 +58462,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -59334,7 +58494,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_tenable_research_advisories_get** -> RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination index_tenable_research_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTenableResearchAdvisoryPaginatePagination index_tenable_research_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"tenable-research-advisories\" @@ -59399,8 +58559,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -59410,7 +58569,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"tenable-research-advisories\" - api_response = api_instance.index_tenable_research_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_tenable_research_advisories_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_tenable_research_advisories_get:\n") pprint(api_response) except Exception as e: @@ -59441,8 +58600,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -59474,7 +58632,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_tencent_get** -> RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination index_tencent_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTencentPaginatePagination index_tencent_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"tencent\" @@ -59539,8 +58697,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -59550,7 +58707,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"tencent\" - api_response = api_instance.index_tencent_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_tencent_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_tencent_get:\n") pprint(api_response) except Exception as e: @@ -59581,8 +58738,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -59614,7 +58770,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_thales_get** -> RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination index_thales_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryThalesPaginatePagination index_thales_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"thales\" @@ -59679,8 +58835,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -59690,7 +58845,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"thales\" - api_response = api_instance.index_thales_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_thales_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_thales_get:\n") pprint(api_response) except Exception as e: @@ -59721,8 +58876,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -59754,7 +58908,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_themissinglink_get** -> RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination index_themissinglink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTheMissingLinkPaginatePagination index_themissinglink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"themissinglink\" @@ -59819,8 +58973,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -59830,7 +58983,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"themissinglink\" - api_response = api_instance.index_themissinglink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_themissinglink_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_themissinglink_get:\n") pprint(api_response) except Exception as e: @@ -59861,8 +59014,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -59894,7 +59046,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_thermo_fisher_get** -> RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination index_thermo_fisher_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryThermoFisherPaginatePagination index_thermo_fisher_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"thermo-fisher\" @@ -59959,8 +59111,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -59970,7 +59121,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"thermo-fisher\" - api_response = api_instance.index_thermo_fisher_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_thermo_fisher_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_thermo_fisher_get:\n") pprint(api_response) except Exception as e: @@ -60001,8 +59152,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -60034,7 +59184,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_threat_actors_get** -> RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination index_threat_actors_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryThreatActorWithExternalObjectsPaginatePagination index_threat_actors_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"threat-actors\" @@ -60099,8 +59249,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -60110,7 +59259,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"threat-actors\" - api_response = api_instance.index_threat_actors_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_threat_actors_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_threat_actors_get:\n") pprint(api_response) except Exception as e: @@ -60141,8 +59290,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -60174,7 +59322,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ti_get** -> RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination index_ti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTIPaginatePagination index_ti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ti\" @@ -60239,8 +59387,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -60250,7 +59397,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ti\" - api_response = api_instance.index_ti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ti_get:\n") pprint(api_response) except Exception as e: @@ -60281,8 +59428,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -60314,7 +59460,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_tibco_get** -> RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination index_tibco_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTibcoPaginatePagination index_tibco_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"tibco\" @@ -60379,8 +59525,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -60390,7 +59535,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"tibco\" - api_response = api_instance.index_tibco_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_tibco_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_tibco_get:\n") pprint(api_response) except Exception as e: @@ -60421,8 +59566,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -60454,7 +59598,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_tp_link_get** -> RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination index_tp_link_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTPLinkPaginatePagination index_tp_link_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"tp-link\" @@ -60519,8 +59663,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -60530,7 +59673,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"tp-link\" - api_response = api_instance.index_tp_link_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_tp_link_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_tp_link_get:\n") pprint(api_response) except Exception as e: @@ -60561,8 +59704,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -60594,7 +59736,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_trane_technology_get** -> RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination index_trane_technology_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTraneTechnologyPaginatePagination index_trane_technology_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"trane-technology\" @@ -60659,8 +59801,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -60670,7 +59811,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"trane-technology\" - api_response = api_instance.index_trane_technology_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_trane_technology_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_trane_technology_get:\n") pprint(api_response) except Exception as e: @@ -60701,8 +59842,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -60734,7 +59874,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_trendmicro_get** -> RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination index_trendmicro_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTrendMicroPaginatePagination index_trendmicro_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"trendmicro\" @@ -60799,8 +59939,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -60810,7 +59949,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"trendmicro\" - api_response = api_instance.index_trendmicro_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_trendmicro_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_trendmicro_get:\n") pprint(api_response) except Exception as e: @@ -60841,8 +59980,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -60874,7 +60012,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_trustwave_get** -> RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination index_trustwave_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTrustwavePaginatePagination index_trustwave_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"trustwave\" @@ -60939,8 +60077,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -60950,7 +60087,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"trustwave\" - api_response = api_instance.index_trustwave_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_trustwave_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_trustwave_get:\n") pprint(api_response) except Exception as e: @@ -60981,8 +60118,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -61014,7 +60150,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_twcert_get** -> RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination index_twcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryTWCertAdvisoryPaginatePagination index_twcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"twcert\" @@ -61079,8 +60215,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -61090,7 +60225,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"twcert\" - api_response = api_instance.index_twcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_twcert_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_twcert_get:\n") pprint(api_response) except Exception as e: @@ -61121,8 +60256,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -61154,7 +60288,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ubiquiti_get** -> RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination index_ubiquiti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryUbiquitiPaginatePagination index_ubiquiti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ubiquiti\" @@ -61219,8 +60353,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -61230,7 +60363,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ubiquiti\" - api_response = api_instance.index_ubiquiti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ubiquiti_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ubiquiti_get:\n") pprint(api_response) except Exception as e: @@ -61261,8 +60394,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -61294,7 +60426,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ubuntu_get** -> RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination index_ubuntu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryUbuntuCVEPaginatePagination index_ubuntu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ubuntu\" @@ -61359,8 +60491,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -61370,7 +60501,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ubuntu\" - api_response = api_instance.index_ubuntu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ubuntu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ubuntu_get:\n") pprint(api_response) except Exception as e: @@ -61401,8 +60532,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -61434,7 +60564,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_ubuntu_purls_get** -> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination index_ubuntu_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayPurlsPurlResponsePaginatePagination index_ubuntu_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"ubuntu-purls\" @@ -61499,8 +60629,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -61510,7 +60639,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"ubuntu-purls\" - api_response = api_instance.index_ubuntu_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_ubuntu_purls_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_ubuntu_purls_get:\n") pprint(api_response) except Exception as e: @@ -61541,8 +60670,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -61574,7 +60702,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_unify_get** -> RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination index_unify_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryUnifyPaginatePagination index_unify_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"unify\" @@ -61639,8 +60767,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -61650,7 +60777,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"unify\" - api_response = api_instance.index_unify_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_unify_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_unify_get:\n") pprint(api_response) except Exception as e: @@ -61681,8 +60808,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -61714,7 +60840,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_unisoc_get** -> RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination index_unisoc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryUnisocPaginatePagination index_unisoc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"unisoc\" @@ -61779,8 +60905,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -61790,7 +60915,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"unisoc\" - api_response = api_instance.index_unisoc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_unisoc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_unisoc_get:\n") pprint(api_response) except Exception as e: @@ -61821,8 +60946,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -61854,7 +60978,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_usd_get** -> RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination index_usd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryUSDPaginatePagination index_usd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"usd\" @@ -61919,8 +61043,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -61930,7 +61053,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"usd\" - api_response = api_instance.index_usd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_usd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_usd_get:\n") pprint(api_response) except Exception as e: @@ -61961,8 +61084,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -61994,7 +61116,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_usom_get** -> RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination index_usom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryUSOMAdvisoryPaginatePagination index_usom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"usom\" @@ -62059,8 +61181,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -62070,7 +61191,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"usom\" - api_response = api_instance.index_usom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_usom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_usom_get:\n") pprint(api_response) except Exception as e: @@ -62101,8 +61222,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -62134,7 +61254,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vandyke_get** -> RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination index_vandyke_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVanDykePaginatePagination index_vandyke_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vandyke\" @@ -62199,8 +61319,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -62210,7 +61329,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vandyke\" - api_response = api_instance.index_vandyke_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vandyke_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vandyke_get:\n") pprint(api_response) except Exception as e: @@ -62241,8 +61360,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -62274,7 +61392,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vapidlabs_get** -> RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination index_vapidlabs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVapidLabsAdvisoryPaginatePagination index_vapidlabs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vapidlabs\" @@ -62339,8 +61457,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -62350,7 +61467,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vapidlabs\" - api_response = api_instance.index_vapidlabs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vapidlabs_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vapidlabs_get:\n") pprint(api_response) except Exception as e: @@ -62381,8 +61498,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -62414,7 +61530,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vc_cpe_dictionary_get** -> RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination index_vc_cpe_dictionary_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVCCPEDictionaryPaginatePagination index_vc_cpe_dictionary_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vc-cpe-dictionary\" @@ -62479,8 +61595,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -62490,7 +61605,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vc-cpe-dictionary\" - api_response = api_instance.index_vc_cpe_dictionary_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vc_cpe_dictionary_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vc_cpe_dictionary_get:\n") pprint(api_response) except Exception as e: @@ -62521,8 +61636,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -62554,7 +61668,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vde_get** -> RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination index_vde_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVDEAdvisoryPaginatePagination index_vde_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vde\" @@ -62619,8 +61733,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -62630,7 +61743,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vde\" - api_response = api_instance.index_vde_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vde_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vde_get:\n") pprint(api_response) except Exception as e: @@ -62661,8 +61774,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -62694,7 +61806,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_veeam_get** -> RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination index_veeam_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVeeamPaginatePagination index_veeam_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"veeam\" @@ -62759,8 +61871,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -62770,7 +61881,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"veeam\" - api_response = api_instance.index_veeam_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_veeam_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_veeam_get:\n") pprint(api_response) except Exception as e: @@ -62801,8 +61912,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -62834,7 +61944,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_veritas_get** -> RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination index_veritas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVeritasPaginatePagination index_veritas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"veritas\" @@ -62899,8 +62009,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -62910,7 +62019,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"veritas\" - api_response = api_instance.index_veritas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_veritas_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_veritas_get:\n") pprint(api_response) except Exception as e: @@ -62941,8 +62050,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -62974,7 +62082,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_virtuozzo_get** -> RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination index_virtuozzo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVirtuozzoPaginatePagination index_virtuozzo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"virtuozzo\" @@ -63039,8 +62147,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -63050,7 +62157,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"virtuozzo\" - api_response = api_instance.index_virtuozzo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_virtuozzo_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_virtuozzo_get:\n") pprint(api_response) except Exception as e: @@ -63081,8 +62188,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -63114,7 +62220,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vlc_get** -> RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination index_vlc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVLCPaginatePagination index_vlc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vlc\" @@ -63179,8 +62285,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -63190,7 +62295,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vlc\" - api_response = api_instance.index_vlc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vlc_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vlc_get:\n") pprint(api_response) except Exception as e: @@ -63221,8 +62326,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -63254,7 +62358,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vmware_get** -> RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination index_vmware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVMWareAdvisoryPaginatePagination index_vmware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vmware\" @@ -63319,8 +62423,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -63330,7 +62433,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vmware\" - api_response = api_instance.index_vmware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vmware_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vmware_get:\n") pprint(api_response) except Exception as e: @@ -63361,8 +62464,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -63394,7 +62496,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_voidsec_get** -> RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination index_voidsec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVoidSecPaginatePagination index_voidsec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"voidsec\" @@ -63459,8 +62561,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -63470,7 +62571,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"voidsec\" - api_response = api_instance.index_voidsec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_voidsec_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_voidsec_get:\n") pprint(api_response) except Exception as e: @@ -63501,8 +62602,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -63534,7 +62634,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_canaries10d_get** -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-canaries-10d\" @@ -63592,8 +62692,8 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: published = 'published_example' # str | Specify a published date (optional) src_country = 'src_country_example' # str | Country code in ISO-3166 format (optional) dst_country = 'dst_country_example' # str | Country code in ISO-3166 format (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + src_ip = 'src_ip_example' # str | Source IP address (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -63603,7 +62703,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-canaries-10d\" - api_response = api_instance.index_vulncheck_canaries10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_canaries10d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_canaries10d_get:\n") pprint(api_response) except Exception as e: @@ -63627,8 +62727,8 @@ Name | Type | Description | Notes **published** | **str**| Specify a published date | [optional] **src_country** | **str**| Country code in ISO-3166 format | [optional] **dst_country** | **str**| Country code in ISO-3166 format | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **src_ip** | **str**| Source IP address | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -63660,7 +62760,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_canaries30d_get** -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-canaries-30d\" @@ -63718,8 +62818,8 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: published = 'published_example' # str | Specify a published date (optional) src_country = 'src_country_example' # str | Country code in ISO-3166 format (optional) dst_country = 'dst_country_example' # str | Country code in ISO-3166 format (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + src_ip = 'src_ip_example' # str | Source IP address (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -63729,7 +62829,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-canaries-30d\" - api_response = api_instance.index_vulncheck_canaries30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_canaries30d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_canaries30d_get:\n") pprint(api_response) except Exception as e: @@ -63753,8 +62853,8 @@ Name | Type | Description | Notes **published** | **str**| Specify a published date | [optional] **src_country** | **str**| Country code in ISO-3166 format | [optional] **dst_country** | **str**| Country code in ISO-3166 format | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **src_ip** | **str**| Source IP address | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -63786,7 +62886,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_canaries3d_get** -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-canaries-3d\" @@ -63844,8 +62944,8 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: published = 'published_example' # str | Specify a published date (optional) src_country = 'src_country_example' # str | Country code in ISO-3166 format (optional) dst_country = 'dst_country_example' # str | Country code in ISO-3166 format (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + src_ip = 'src_ip_example' # str | Source IP address (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -63855,7 +62955,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-canaries-3d\" - api_response = api_instance.index_vulncheck_canaries3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_canaries3d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_canaries3d_get:\n") pprint(api_response) except Exception as e: @@ -63879,8 +62979,8 @@ Name | Type | Description | Notes **published** | **str**| Specify a published date | [optional] **src_country** | **str**| Country code in ISO-3166 format | [optional] **dst_country** | **str**| Country code in ISO-3166 format | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **src_ip** | **str**| Source IP address | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -63912,7 +63012,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_canaries90d_get** -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-canaries-90d\" @@ -63970,8 +63070,8 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: published = 'published_example' # str | Specify a published date (optional) src_country = 'src_country_example' # str | Country code in ISO-3166 format (optional) dst_country = 'dst_country_example' # str | Country code in ISO-3166 format (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + src_ip = 'src_ip_example' # str | Source IP address (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -63981,7 +63081,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-canaries-90d\" - api_response = api_instance.index_vulncheck_canaries90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_canaries90d_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_canaries90d_get:\n") pprint(api_response) except Exception as e: @@ -64005,8 +63105,8 @@ Name | Type | Description | Notes **published** | **str**| Specify a published date | [optional] **src_country** | **str**| Country code in ISO-3166 format | [optional] **dst_country** | **str**| Country code in ISO-3166 format | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **src_ip** | **str**| Source IP address | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -64038,7 +63138,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_canaries_get** -> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnCheckCanaryPaginatePagination index_vulncheck_canaries_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-canaries\" @@ -64096,8 +63196,8 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: published = 'published_example' # str | Specify a published date (optional) src_country = 'src_country_example' # str | Country code in ISO-3166 format (optional) dst_country = 'dst_country_example' # str | Country code in ISO-3166 format (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + src_ip = 'src_ip_example' # str | Source IP address (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -64107,7 +63207,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-canaries\" - api_response = api_instance.index_vulncheck_canaries_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_canaries_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, published=published, src_country=src_country, dst_country=dst_country, src_ip=src_ip, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_canaries_get:\n") pprint(api_response) except Exception as e: @@ -64131,8 +63231,8 @@ Name | Type | Description | Notes **published** | **str**| Specify a published date | [optional] **src_country** | **str**| Country code in ISO-3166 format | [optional] **dst_country** | **str**| Country code in ISO-3166 format | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **src_ip** | **str**| Source IP address | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -64164,7 +63264,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_config_get** -> RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination index_vulncheck_config_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVulnCheckConfigPaginatePagination index_vulncheck_config_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-config\" @@ -64229,8 +63329,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -64240,7 +63339,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-config\" - api_response = api_instance.index_vulncheck_config_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_config_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_config_get:\n") pprint(api_response) except Exception as e: @@ -64271,8 +63370,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -64304,7 +63402,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_cvelist_v5_get** -> RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination index_vulncheck_cvelist_v5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVulnCheckCVEListV5PaginatePagination index_vulncheck_cvelist_v5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-cvelist-v5\" @@ -64369,8 +63467,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -64380,7 +63477,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-cvelist-v5\" - api_response = api_instance.index_vulncheck_cvelist_v5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_cvelist_v5_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_cvelist_v5_get:\n") pprint(api_response) except Exception as e: @@ -64411,8 +63508,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -64444,7 +63540,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_get** -> RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination index_vulncheck_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVulnCheckPaginatePagination index_vulncheck_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck\" @@ -64509,8 +63605,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -64520,7 +63615,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck\" - api_response = api_instance.index_vulncheck_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_get:\n") pprint(api_response) except Exception as e: @@ -64551,8 +63646,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -64584,7 +63678,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_kev_get** -> RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination index_vulncheck_kev_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVulnCheckKEVPaginatePagination index_vulncheck_kev_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-kev\" @@ -64649,8 +63743,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -64660,7 +63753,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-kev\" - api_response = api_instance.index_vulncheck_kev_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_kev_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_kev_get:\n") pprint(api_response) except Exception as e: @@ -64691,8 +63784,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -64724,7 +63816,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_nvd2_get** -> RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination index_vulncheck_nvd2_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiNVD20CVEExtendedPaginatePagination index_vulncheck_nvd2_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-nvd2\" @@ -64789,8 +63881,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -64800,7 +63891,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-nvd2\" - api_response = api_instance.index_vulncheck_nvd2_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_nvd2_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_nvd2_get:\n") pprint(api_response) except Exception as e: @@ -64831,8 +63922,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -64864,7 +63954,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulncheck_nvd_get** -> RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination index_vulncheck_nvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiCveItemsExtendedPaginatePagination index_vulncheck_nvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulncheck-nvd\" @@ -64929,8 +64019,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -64940,7 +64029,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulncheck-nvd\" - api_response = api_instance.index_vulncheck_nvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulncheck_nvd_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulncheck_nvd_get:\n") pprint(api_response) except Exception as e: @@ -64971,8 +64060,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -65004,7 +64092,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulnerability_aliases_get** -> RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination index_vulnerability_aliases_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayApiVulnerabilityAliasPaginatePagination index_vulnerability_aliases_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulnerability-aliases\" @@ -65069,8 +64157,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -65080,7 +64167,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulnerability-aliases\" - api_response = api_instance.index_vulnerability_aliases_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulnerability_aliases_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulnerability_aliases_get:\n") pprint(api_response) except Exception as e: @@ -65111,8 +64198,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -65144,7 +64230,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vulnrichment_get** -> RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination index_vulnrichment_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVulnrichmentPaginatePagination index_vulnrichment_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vulnrichment\" @@ -65209,8 +64295,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -65220,7 +64305,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vulnrichment\" - api_response = api_instance.index_vulnrichment_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vulnrichment_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vulnrichment_get:\n") pprint(api_response) except Exception as e: @@ -65251,8 +64336,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -65284,7 +64368,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_vyaire_get** -> RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination index_vyaire_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryVYAIREAdvisoryPaginatePagination index_vyaire_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"vyaire\" @@ -65349,8 +64433,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -65360,7 +64443,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"vyaire\" - api_response = api_instance.index_vyaire_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_vyaire_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_vyaire_get:\n") pprint(api_response) except Exception as e: @@ -65391,8 +64474,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -65424,7 +64506,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_watchguard_get** -> RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination index_watchguard_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWatchGuardPaginatePagination index_watchguard_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"watchguard\" @@ -65489,8 +64571,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -65500,7 +64581,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"watchguard\" - api_response = api_instance.index_watchguard_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_watchguard_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_watchguard_get:\n") pprint(api_response) except Exception as e: @@ -65531,8 +64612,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -65564,7 +64644,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_whatsapp_get** -> RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination index_whatsapp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWhatsAppPaginatePagination index_whatsapp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"whatsapp\" @@ -65629,8 +64709,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -65640,7 +64719,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"whatsapp\" - api_response = api_instance.index_whatsapp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_whatsapp_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_whatsapp_get:\n") pprint(api_response) except Exception as e: @@ -65671,8 +64750,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -65704,7 +64782,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_wibu_get** -> RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination index_wibu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWibuPaginatePagination index_wibu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"wibu\" @@ -65769,8 +64847,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -65780,7 +64857,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"wibu\" - api_response = api_instance.index_wibu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_wibu_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_wibu_get:\n") pprint(api_response) except Exception as e: @@ -65811,8 +64888,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -65844,7 +64920,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_wireshark_get** -> RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination index_wireshark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWiresharkPaginatePagination index_wireshark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"wireshark\" @@ -65909,8 +64985,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -65920,7 +64995,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"wireshark\" - api_response = api_instance.index_wireshark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_wireshark_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_wireshark_get:\n") pprint(api_response) except Exception as e: @@ -65951,8 +65026,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -65984,7 +65058,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_with_secure_get** -> RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination index_with_secure_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWithSecurePaginatePagination index_with_secure_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"with-secure\" @@ -66049,8 +65123,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -66060,7 +65133,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"with-secure\" - api_response = api_instance.index_with_secure_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_with_secure_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_with_secure_get:\n") pprint(api_response) except Exception as e: @@ -66091,8 +65164,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -66124,7 +65196,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_wolfi_get** -> RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination index_wolfi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWolfiPaginatePagination index_wolfi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"wolfi\" @@ -66189,8 +65261,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -66200,7 +65271,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"wolfi\" - api_response = api_instance.index_wolfi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_wolfi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_wolfi_get:\n") pprint(api_response) except Exception as e: @@ -66231,8 +65302,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -66264,7 +65334,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_wolfssl_get** -> RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination index_wolfssl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWolfSSLPaginatePagination index_wolfssl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"wolfssl\" @@ -66329,8 +65399,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -66340,7 +65409,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"wolfssl\" - api_response = api_instance.index_wolfssl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_wolfssl_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_wolfssl_get:\n") pprint(api_response) except Exception as e: @@ -66371,8 +65440,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -66404,7 +65472,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_wordfence_get** -> RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination index_wordfence_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryWordfencePaginatePagination index_wordfence_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"wordfence\" @@ -66469,8 +65537,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -66480,7 +65547,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"wordfence\" - api_response = api_instance.index_wordfence_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_wordfence_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_wordfence_get:\n") pprint(api_response) except Exception as e: @@ -66511,8 +65578,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -66544,7 +65610,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_xen_get** -> RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination index_xen_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryXenPaginatePagination index_xen_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"xen\" @@ -66609,8 +65675,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -66620,7 +65685,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"xen\" - api_response = api_instance.index_xen_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_xen_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_xen_get:\n") pprint(api_response) except Exception as e: @@ -66651,8 +65716,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -66684,7 +65748,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_xerox_get** -> RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination index_xerox_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryXeroxPaginatePagination index_xerox_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"xerox\" @@ -66749,8 +65813,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -66760,7 +65823,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"xerox\" - api_response = api_instance.index_xerox_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_xerox_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_xerox_get:\n") pprint(api_response) except Exception as e: @@ -66791,8 +65854,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -66824,7 +65886,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_xiaomi_get** -> RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination index_xiaomi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryXiaomiPaginatePagination index_xiaomi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"xiaomi\" @@ -66889,8 +65951,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -66900,7 +65961,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"xiaomi\" - api_response = api_instance.index_xiaomi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_xiaomi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_xiaomi_get:\n") pprint(api_response) except Exception as e: @@ -66931,8 +65992,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -66964,7 +66024,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_xylem_get** -> RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination index_xylem_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryXylemPaginatePagination index_xylem_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"xylem\" @@ -67029,8 +66089,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -67040,7 +66099,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"xylem\" - api_response = api_instance.index_xylem_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_xylem_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_xylem_get:\n") pprint(api_response) except Exception as e: @@ -67071,8 +66130,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -67104,7 +66162,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_yamaha_get** -> RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination index_yamaha_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryYamahaPaginatePagination index_yamaha_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"yamaha\" @@ -67169,8 +66227,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -67180,7 +66237,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"yamaha\" - api_response = api_instance.index_yamaha_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_yamaha_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_yamaha_get:\n") pprint(api_response) except Exception as e: @@ -67211,8 +66268,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -67244,7 +66300,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_yokogawa_get** -> RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination index_yokogawa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryYokogawaAdvisoryPaginatePagination index_yokogawa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"yokogawa\" @@ -67309,8 +66365,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -67320,7 +66375,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"yokogawa\" - api_response = api_instance.index_yokogawa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_yokogawa_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_yokogawa_get:\n") pprint(api_response) except Exception as e: @@ -67351,8 +66406,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -67384,7 +66438,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_yubico_get** -> RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination index_yubico_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryYubicoPaginatePagination index_yubico_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"yubico\" @@ -67449,8 +66503,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -67460,7 +66513,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"yubico\" - api_response = api_instance.index_yubico_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_yubico_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_yubico_get:\n") pprint(api_response) except Exception as e: @@ -67491,8 +66544,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -67524,7 +66576,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_zdi_get** -> RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination index_zdi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryZeroDayAdvisoryPaginatePagination index_zdi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"zdi\" @@ -67589,8 +66641,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -67600,7 +66651,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"zdi\" - api_response = api_instance.index_zdi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_zdi_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_zdi_get:\n") pprint(api_response) except Exception as e: @@ -67631,8 +66682,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -67664,7 +66714,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_zebra_get** -> RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination index_zebra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryZebraPaginatePagination index_zebra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"zebra\" @@ -67729,8 +66779,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -67740,7 +66789,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"zebra\" - api_response = api_instance.index_zebra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_zebra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_zebra_get:\n") pprint(api_response) except Exception as e: @@ -67771,8 +66820,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -67804,7 +66852,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_zeroscience_get** -> RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination index_zeroscience_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryZeroScienceAdvisoryPaginatePagination index_zeroscience_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"zeroscience\" @@ -67869,8 +66917,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -67880,7 +66927,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"zeroscience\" - api_response = api_instance.index_zeroscience_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_zeroscience_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_zeroscience_get:\n") pprint(api_response) except Exception as e: @@ -67911,8 +66958,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -67944,7 +66990,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_zimbra_get** -> RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination index_zimbra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryZimbraPaginatePagination index_zimbra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"zimbra\" @@ -68009,8 +67055,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -68020,7 +67065,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"zimbra\" - api_response = api_instance.index_zimbra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_zimbra_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_zimbra_get:\n") pprint(api_response) except Exception as e: @@ -68051,8 +67096,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -68084,7 +67128,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_zoom_get** -> RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination index_zoom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryZoomPaginatePagination index_zoom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"zoom\" @@ -68149,8 +67193,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -68160,7 +67203,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"zoom\" - api_response = api_instance.index_zoom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_zoom_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_zoom_get:\n") pprint(api_response) except Exception as e: @@ -68191,8 +67234,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -68224,7 +67266,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_zscaler_get** -> RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination index_zscaler_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryZscalerPaginatePagination index_zscaler_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"zscaler\" @@ -68289,8 +67331,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -68300,7 +67341,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"zscaler\" - api_response = api_instance.index_zscaler_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_zscaler_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_zscaler_get:\n") pprint(api_response) except Exception as e: @@ -68331,8 +67372,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -68364,7 +67404,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_zuso_get** -> RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination index_zuso_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryZusoPaginatePagination index_zuso_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"zuso\" @@ -68429,8 +67469,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -68440,7 +67479,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"zuso\" - api_response = api_instance.index_zuso_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_zuso_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_zuso_get:\n") pprint(api_response) except Exception as e: @@ -68471,8 +67510,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] @@ -68504,7 +67542,7 @@ Name | Type | Description | Notes [[Back to top]](#) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to Model list]](../README.md#documentation-for-models) [[Back to README]](../README.md) # **index_zyxel_get** -> RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination index_zyxel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) +> RenderResponseWithMetadataArrayAdvisoryZyxelPaginatePagination index_zyxel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) Return vulnerability data stored in index \"zyxel\" @@ -68569,8 +67607,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: ransomware = 'ransomware_example' # str | Specify a ransomeware family name to search with. (optional) botnet = 'botnet_example' # str | Specify a botnet name to search with. (optional) published = 'published_example' # str | Specify a published date (optional) - var_date = 'var_date_example' # str | Specify a starting published date to filter with. (optional) - var_date2 = 'var_date_example' # str | Specify an ending published date to filter with. (optional) + var_date = 'var_date_example' # str | Specify an exact published date to filter with. (optional) updated_at_start_date = 'updated_at_start_date_example' # str | Specify a starting 'updated-at' date to filter with. (optional) updated_at_end_date = 'updated_at_end_date_example' # str | Specify an ending 'updated-at' date to filter with. (optional) last_mod_start_date = 'last_mod_start_date_example' # str | Specify a starting last modified date to filter with. (optional) @@ -68580,7 +67617,7 @@ with vulncheck_sdk.ApiClient(configuration) as api_client: try: # Return vulnerability data stored in index \"zyxel\" - api_response = api_instance.index_zyxel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) + api_response = api_instance.index_zyxel_get(page=page, limit=limit, cursor=cursor, start_cursor=start_cursor, order=order, sort=sort, cve=cve, alias=alias, iava=iava, jvndb=jvndb, ilvn=ilvn, threat_actor=threat_actor, mitre_id=mitre_id, misp_id=misp_id, ransomware=ransomware, botnet=botnet, published=published, var_date=var_date, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, last_mod_end_date=last_mod_end_date, pub_start_date=pub_start_date, pub_end_date=pub_end_date) print("The response of IndicesApi->index_zyxel_get:\n") pprint(api_response) except Exception as e: @@ -68611,8 +67648,7 @@ Name | Type | Description | Notes **ransomware** | **str**| Specify a ransomeware family name to search with. | [optional] **botnet** | **str**| Specify a botnet name to search with. | [optional] **published** | **str**| Specify a published date | [optional] - **var_date** | **str**| Specify a starting published date to filter with. | [optional] - **var_date2** | **str**| Specify an ending published date to filter with. | [optional] + **var_date** | **str**| Specify an exact published date to filter with. | [optional] **updated_at_start_date** | **str**| Specify a starting 'updated-at' date to filter with. | [optional] **updated_at_end_date** | **str**| Specify an ending 'updated-at' date to filter with. | [optional] **last_mod_start_date** | **str**| Specify a starting last modified date to filter with. | [optional] diff --git a/docs/PurlBatchVulnFinding.md b/docs/PurlBatchVulnFinding.md index 76b7e89e..7186ffdb 100644 --- a/docs/PurlBatchVulnFinding.md +++ b/docs/PurlBatchVulnFinding.md @@ -7,7 +7,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **cves** | **List[str]** | list of associated CVE 's | [optional] **purl** | **str** | the purl, ex. hex/coherence@0.1.2 | [optional] -**purl_struct** | [**PurlPackageURLJSON**](PurlPackageURLJSON.md) | meta-data about the purl | [optional] +**purl_struct** | [**PurlPackageURLJSON**](PurlPackageURLJSON.md) | | [optional] **research_attributes** | [**ApiOSSPackageResearchAttributes**](ApiOSSPackageResearchAttributes.md) | | [optional] **vulnerabilities** | [**List[ApiOSSPackageVulnerability]**](ApiOSSPackageVulnerability.md) | list of associated vulnerabilities | [optional] diff --git a/docs/PurlPackageURLJSON.md b/docs/PurlPackageURLJSON.md index 31663664..96eee60f 100644 --- a/docs/PurlPackageURLJSON.md +++ b/docs/PurlPackageURLJSON.md @@ -1,5 +1,6 @@ # PurlPackageURLJSON +meta-data about the purl ## Properties diff --git a/docs/V3controllersPurlResponseMetadata.md b/docs/V3controllersPurlResponseMetadata.md index 276e97e8..fce5b530 100644 --- a/docs/V3controllersPurlResponseMetadata.md +++ b/docs/V3controllersPurlResponseMetadata.md @@ -5,7 +5,7 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- -**purl_struct** | [**PurlPackageURLJSON**](PurlPackageURLJSON.md) | meta-data about the purl | [optional] +**purl_struct** | [**PurlPackageURLJSON**](PurlPackageURLJSON.md) | | [optional] **timestamp** | **str** | time of the transaction | [optional] **total_documents** | **int** | number of results found | [optional] diff --git a/openapi.json b/openapi.json index 0367eabe..1cf03467 100644 --- a/openapi.json +++ b/openapi.json @@ -1 +1 @@ -{"basePath":"/v3","definitions":{"advisory.A10":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"reference":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ABBAdvisory":{"properties":{"abb_vulnerability_id":{"items":{"type":"string"},"type":"array"},"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"document_id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ADP":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.MAffected"},"type":"array"},"metrics":{"items":{"$ref":"#/definitions/advisory.VulnrichmentMetric"},"type":"array"},"providerMetadata":{"$ref":"#/definitions/advisory.MProviderMetadata"}},"type":"object"},"advisory.ADPContainer":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.MAffected"},"type":"array"},"datePublic":{"description":"OK","type":"string"},"descriptions":{"description":"OK","items":{"$ref":"#/definitions/advisory.MDescriptions"},"type":"array"},"impacts":{"description":"OK","items":{"$ref":"#/definitions/advisory.Impact"},"type":"array"},"metrics":{"description":"OK","items":{"$ref":"#/definitions/advisory.Metric"},"type":"array"},"problemTypes":{"description":"OK","items":{"$ref":"#/definitions/advisory.MProblemTypes"},"type":"array"},"providerMetadata":{"allOf":[{"$ref":"#/definitions/advisory.MProviderMetadata"}],"description":"OK"},"references":{"items":{"$ref":"#/definitions/advisory.MReference"},"type":"array"},"tags":{"description":"OK","items":{"type":"string"},"type":"array"},"title":{"description":"OK","type":"string"}},"type":"object"},"advisory.AIX":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMD":{"properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMI":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ASRG":{"properties":{"affected_products":{"type":"string"},"capec":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"problem_type":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVEVAAdvisory":{"properties":{"aveva_vulnerability_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"published_by":{"type":"string"},"rating":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVIDMLAdvs":{"properties":{"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AWS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Abbott":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Absolute":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Acknowledgement":{"properties":{"name":{"items":{"$ref":"#/definitions/advisory.IVal"},"type":"array"},"url":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Acronis":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdobeAdvisory":{"properties":{"adobe_cves":{"items":{"$ref":"#/definitions/advisory.AdobeCVE"},"type":"array"},"affected":{"items":{"$ref":"#/definitions/advisory.AdobeAffected"},"type":"array"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"solutions":{"items":{"$ref":"#/definitions/advisory.AdobeSolution"},"type":"array"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AdobeAffected":{"properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AdobeCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.AdobeSolution":{"properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Advantech":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Advisory":{"properties":{"affects":{"type":"string"},"announced":{"type":"string"},"category":{"type":"string"},"corrections":{"items":{"$ref":"#/definitions/advisory.Correction"},"type":"array"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"module":{"type":"string"},"name":{"type":"string"},"topic":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdvisoryDetails":{"properties":{"bugzilla":{"$ref":"#/definitions/advisory.Bugzilla"},"cve":{"$ref":"#/definitions/advisory.OvalCVE"},"issued":{"$ref":"#/definitions/advisory.Issued"},"severity":{"type":"string"},"updated":{"$ref":"#/definitions/advisory.Updated"}},"type":"object"},"advisory.AdvisoryRecord":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"external_id":{"items":{"type":"string"},"type":"array"},"lang":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.Affected":{"properties":{"database_specific":{"description":"The meaning of the values within the object is entirely defined by the database"},"ecosystem_specific":{"description":"The meaning of the values within the object is entirely defined by the ecosystem"},"package":{"$ref":"#/definitions/advisory.OSVPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.Range"},"type":"array"},"severity":{"items":{"$ref":"#/definitions/advisory.Severity"},"type":"array"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.AffectedChrome":{"properties":{"fixed_version":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.AffectedDebianPackage":{"properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRelease":{"properties":{"fixed_version":{"type":"string"},"nodsa":{"type":"string"},"nodsa_reason":{"type":"string"},"release_name":{"type":"string"},"repositories":{"items":{"$ref":"#/definitions/advisory.AffectedDebianRepository"},"type":"array"},"status":{"type":"string"},"urgency":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRepository":{"properties":{"repository_name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedFile":{"properties":{"file_last_modified":{"type":"string"},"file_name":{"type":"string"}},"type":"object"},"advisory.AffectedProduct":{"properties":{"affectedReleases":{"type":"string"},"fixedReleases":{"type":"string"},"lexmarkModels":{"type":"string"}},"type":"object"},"advisory.AffectedRel":{"properties":{"advisory":{"type":"string"},"cpe":{"type":"string"},"package":{"type":"string"},"product_name":{"type":"string"},"release_date":{"type":"string"}},"type":"object"},"advisory.AffectedUbuntuPackage":{"properties":{"break_commit_url":{"items":{"type":"string"},"type":"array"},"fix_commit_url":{"items":{"type":"string"},"type":"array"},"package_name":{"type":"string"},"package_release_status":{"items":{"$ref":"#/definitions/advisory.UbuntuPackageReleaseStatus"},"type":"array"},"upstream_fix_url":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.AlephResearch":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Alibaba":{"properties":{"cnnvd":{"items":{"type":"string"},"type":"array"},"cnvd":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation_cn":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AlmaDate":{"properties":{"$date":{"type":"integer"}},"type":"object"},"advisory.AlmaLinuxUpdate":{"properties":{"bs_repo_id":{"$ref":"#/definitions/advisory.AlmaObjectID"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fromstr":{"type":"string"},"id":{"$ref":"#/definitions/advisory.AlmaObjectID"},"issued_date":{"$ref":"#/definitions/advisory.AlmaDate"},"pkglist":{"$ref":"#/definitions/advisory.AlmaPackageList"},"pushcount":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.AlmaReference"},"type":"array"},"release":{"type":"string"},"rights":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"update_url":{"type":"string"},"updated_date":{"$ref":"#/definitions/advisory.AlmaDate"},"updateinfo_id":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaObjectID":{"properties":{"$oid":{"type":"string"}},"type":"object"},"advisory.AlmaPackage":{"properties":{"arch":{"type":"string"},"epoch":{"type":"string"},"filename":{"type":"string"},"name":{"type":"string"},"reboot_suggested":{"type":"integer"},"release":{"type":"string"},"source":{"type":"string"},"sum":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaPackageList":{"properties":{"name":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.AlmaPackage"},"type":"array"},"shortname":{"type":"string"}},"type":"object"},"advisory.AlmaReference":{"properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDB":{"properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"distroversion":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.AlpineLinuxSecDBPackage"},"type":"array"},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDBPackage":{"properties":{"package_name":{"type":"string"},"secfixes":{"items":{"$ref":"#/definitions/advisory.AlpineLinuxSecurityFix"},"type":"array"}},"type":"object"},"advisory.AlpineLinuxSecurityFix":{"properties":{"cve":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"advisory.AmazonAffectedPackage":{"properties":{"advisory":{"type":"string"},"package":{"type":"string"},"platform":{"type":"string"},"releaseDate":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.AmazonCVE":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.AmazonAffectedPackage"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AnchoreNVDOverride":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"override":{"$ref":"#/definitions/advisory.Override"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAdvisory":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.AndroidAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.AndroidReference"},"type":"array"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAffected":{"properties":{"ecosystem_specific":{"$ref":"#/definitions/advisory.EcoSystem"},"package":{"$ref":"#/definitions/advisory.AndroidPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.AndroidRange"},"type":"array"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.AndroidEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.AndroidPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.AndroidRange":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.AndroidEvent"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.AndroidReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheActiveMQ":{"properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArchiva":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArrow":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCamel":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCommons":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCouchDB":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheFlink":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheGuacamole":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHTTP":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHadoop":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheJSPWiki":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheKafka":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheLoggingServices":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheNiFi":{"properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOFBiz":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenMeetings":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenOffice":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApachePulsar":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheShiro":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSpark":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheStruts":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"rating":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_version":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.ApacheSubversion":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSuperset":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheTomcat":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheZooKeeper":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppCheck":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Appgate":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleAdvisory":{"properties":{"components":{"items":{"$ref":"#/definitions/advisory.AppleComponent"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleComponent":{"properties":{"available_for":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"impact":{"type":"string"},"itw_exploit":{"type":"boolean"},"name":{"type":"string"}},"type":"object"},"advisory.ArchIssue":{"properties":{"advisories":{"items":{"type":"string"},"type":"array"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"issues":{"description":"cves","items":{"type":"string"},"type":"array"},"name":{"type":"string"},"packages":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"status":{"type":"string"},"ticket":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Arista":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Aruba":{"properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AssetNote":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asterisk":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Astra":{"properties":{"bdu":{"items":{"type":"string"},"type":"array"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_ru":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asus":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianAdvisory":{"properties":{"affected_version":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"detailed_summary":{"description":"overloading in places with 'RiskAssessment' and other places with\n'Description'","type":"string"},"fixed_version":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"release_date":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianProducts":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"fixed":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"}},"type":"object"},"advisory.AtlassianVuln":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"products":{"items":{"$ref":"#/definitions/advisory.AtlassianProducts"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Atredis":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendors":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Audiocodes":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AusCert":{"properties":{"body":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"link":{"type":"string"},"operatingSystem":{"type":"string"},"product":{"type":"string"},"publisher":{"type":"string"},"resolution":{"type":"string"}},"type":"object"},"advisory.Autodesk":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avaya":{"properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"last_revised":{"type":"string"},"overview":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avigilon":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Award":{"properties":{"amount":{"type":"string"},"currency":{"type":"string"}},"type":"object"},"advisory.Axis":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Azul":{"properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"prime_version":{"items":{"$ref":"#/definitions/advisory.PrimeVersion"},"type":"array"},"release":{"type":"string"},"url":{"type":"string"},"zulu_version":{"items":{"$ref":"#/definitions/advisory.ZuluVersion"},"type":"array"}},"type":"object"},"advisory.BBraunAdvisory":{"properties":{"attention":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"equipment":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerabilities":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.BDUAdvisory":{"properties":{"bdu_id":{"description":"BDU:2022-03833","type":"string"},"cve":{"description":"[]string{\"CVE-2022-28194\"}","items":{"type":"string"},"type":"array"},"cvss":{"$ref":"#/definitions/advisory.BDUCvss"},"cvss3":{"$ref":"#/definitions/advisory.BDUCvss3"},"cwe":{"description":"CWE-119","type":"string"},"date_added":{"type":"string"},"description_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"environment":{"$ref":"#/definitions/advisory.BDUEnvironment"},"exploit_status_en":{"description":"Exploited","type":"string"},"exploit_status_ru":{"description":"Exploited","type":"string"},"fix_status_en":{"description":"Fixed","type":"string"},"fix_status_ru":{"description":"Fixed","type":"string"},"identify_date":{"description":"2022-09-01","type":"string"},"name_ru":{"description":"BDU:2022-03833: Уязвимость модуля Cboot (tegrabl_cbo.c) пакета драйверов микропрограммного обеспечения вычислительных плат NVIDIA Jetson, позволяющая нарушителю выполнить произвольный код или вызвать частичный отказ в обслуживании","type":"string"},"severity_ru":{"description":"High","type":"string"},"solution_ru":{"description":"Обновите драйверы микропрограммного обеспечения вычислительных плат NVIDIA Jetson до версии 32.6.1 или более поздней","type":"string"},"sources":{"description":"https://nvd.nist.gov/vuln/detail/CVE-2022-28194","items":{"type":"string"},"type":"array"},"text_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"url":{"description":"https://bdu.fstec.ru/vul/2022-03833","type":"string"},"vul_status_en":{"description":"Exploitable","type":"string"},"vul_status_ru":{"description":"Exploitable","type":"string"},"vulnerable_software":{"$ref":"#/definitions/advisory.BDUVulnerableSoftware"}},"type":"object"},"advisory.BDUCvss":{"properties":{"vector":{"$ref":"#/definitions/advisory.BDUVector"}},"type":"object"},"advisory.BDUCvss3":{"properties":{"vector":{"$ref":"#/definitions/advisory.BDUVector"}},"type":"object"},"advisory.BDUEnvironment":{"properties":{"os":{"$ref":"#/definitions/advisory.BDUOs"}},"type":"object"},"advisory.BDUOs":{"properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUSoft":{"properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"types":{"$ref":"#/definitions/advisory.BDUTypes"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUTypes":{"properties":{"text":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.BDUVector":{"properties":{"score":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.BDUVulnerableSoftware":{"properties":{"soft":{"$ref":"#/definitions/advisory.BDUSoft"}},"type":"object"},"advisory.BLS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"prodcut":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Bandr":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"document_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BaxterAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeckhoffAdvisory":{"properties":{"beckhoff_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"description":"if in the future we can delete this great - it's just a dupe to\nnormalize the field names","type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.BeckmanCoulter":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BectonDickinsonAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"products_affected":{"items":{"$ref":"#/definitions/advisory.ProductsAffected"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeldenAdvisory":{"properties":{"belden_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BeyondTrust":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Binarly":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BitDefender":{"properties":{"additional_details":{"type":"string"},"affected_products":{"type":"string"},"affected_vendors":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"details":{"type":"string"},"timeline":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BlackBerry":{"properties":{"bsrt":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BoschAdvisory":{"properties":{"bosch_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BostonScientificAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Botnet":{"properties":{"associated_capecs":{"items":{"$ref":"#/definitions/advisory.Capec"},"type":"array"},"associated_cwes":{"items":{"$ref":"#/definitions/advisory.CweData"},"type":"array"},"associated_mitre_attack_techniques":{"items":{"$ref":"#/definitions/advisory.MitreAttackTechWithRefs"},"type":"array"},"botnet_name":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cve_references":{"items":{"$ref":"#/definitions/advisory.CVEReference"},"type":"array"},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"tools":{"items":{"$ref":"#/definitions/advisory.Tool"},"type":"array"}},"type":"object"},"advisory.Bugzilla":{"properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CACyberCentreAdvisory":{"properties":{"control_systems":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"html_url":{"type":"string"},"serial_number":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CBLMariner":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CERTEUAdvisory":{"properties":{"advisoryId":{"type":"string"},"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"history":{"items":{"type":"string"},"type":"array"},"link":{"type":"string"},"recommendations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"technicalDetails":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CESA":{"properties":{"arch":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"issueDate":{"type":"string"},"osRelease":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.CentosPackage"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CISAAlert":{"properties":{"affectedProducts":{"type":"string"},"alertID":{"type":"string"},"archived":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array"},"cveexploitedITW":{"type":"boolean"},"cvss":{"type":"string"},"date_added":{"type":"string"},"icsa":{"type":"boolean"},"icsma":{"type":"boolean"},"mitigations":{"type":"string"},"releaseDate":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.CISControl":{"properties":{"cis_control_description":{"type":"string"},"cis_control_id":{"type":"string"},"cis_control_name":{"type":"string"}},"type":"object"},"advisory.CNNVDEntryJSON":{"properties":{"bugtraq-id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"modified-date":{"type":"string"},"name_cn":{"type":"string"},"published-date":{"type":"string"},"severity_cn":{"type":"string"},"severity_en":{"type":"string"},"source":{"type":"string"},"url":{"type":"string"},"vuln-description_cn":{"type":"string"},"vuln-solution":{"type":"string"},"vuln-type_cn":{"type":"string"},"vuln-type_en":{"type":"string"}},"type":"object"},"advisory.CNVDBulletin":{"properties":{"cnta":{"type":"string"},"cnvd":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CNVDFlaw":{"properties":{"affected_products_cn":{"type":"string"},"bugtraq_id":{"type":"string"},"cnvd":{"type":"string"},"collection_time":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"harm_level":{"type":"string"},"id":{"type":"string"},"public_date":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array"},"submission_time":{"type":"string"},"title_cn":{"type":"string"},"update_time":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"validation_info_cn":{"type":"string"},"validation_info_en":{"type":"string"},"vendor_patch_cn":{"type":"string"},"vuln_attachments":{"items":{"type":"string"},"type":"array"},"vuln_description_cn":{"type":"string"},"vuln_solution_cn":{"type":"string"},"vuln_type_cn":{"type":"string"}},"type":"object"},"advisory.COSUpdate":{"properties":{"changed":{"items":{"type":"string"},"type":"array"},"featured":{"items":{"type":"string"},"type":"array"},"fixed":{"items":{"type":"string"},"type":"array"},"id":{"type":"string"},"reference":{"type":"string"},"security":{"items":{"type":"string"},"type":"array"},"updated":{"type":"string"}},"type":"object"},"advisory.CPEMatch":{"properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.CPENode":{"properties":{"cpeMatch":{"items":{"$ref":"#/definitions/advisory.CPEMatch"},"type":"array"},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.CSAF":{"properties":{"document":{"allOf":[{"$ref":"#/definitions/advisory.DocumentMetadata"}],"description":"Document contains metadata about the CSAF document itself.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property"},"notes":{"description":"Notes holds notes associated with the whole document.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3217-document-property---notes","items":{"$ref":"#/definitions/advisory.CSAFNote"},"type":"array"},"product_tree":{"allOf":[{"$ref":"#/definitions/advisory.ProductBranch"}],"description":"ProductTree contains information about the product tree (branches only).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property"},"vulnerabilities":{"description":"Vulnerabilities contains information about the vulnerabilities,\n(i.e. CVEs), associated threats, and product status.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#323-vulnerabilities-property","items":{"$ref":"#/definitions/advisory.CSAFVulnerability"},"type":"array"}},"type":"object"},"advisory.CSAFDistribution":{"type":"object"},"advisory.CSAFNote":{"properties":{"audience":{"type":"string"},"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CSAFReference":{"properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CSAFRelationship":{"properties":{"category":{"type":"string"},"full_product_name":{"$ref":"#/definitions/advisory.Product"},"product_reference":{"type":"string"},"relates_to_product_reference":{"type":"string"}},"type":"object"},"advisory.CSAFScore":{"properties":{"cvss_v2":{"$ref":"#/definitions/advisory.CVSSV2"},"cvss_v3":{"$ref":"#/definitions/advisory.CVSSV3"},"products":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.CSAFVulnerability":{"properties":{"cve":{"description":"MITRE standard Common Vulnerabilities and Exposures (CVE) tracking number for the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3232-vulnerabilities-property---cve","type":"string"},"cwe":{"$ref":"#/definitions/advisory.Cwe"},"flags":{"description":"Machine readable flags for products related to vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3235-vulnerabilities-property---flags","items":{"$ref":"#/definitions/advisory.Flag"},"type":"array"},"ids":{"description":"List of IDs represents a list of unique labels or tracking IDs for the vulnerability (if such information exists).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3236-vulnerabilities-property---ids","items":{"$ref":"#/definitions/advisory.TrackingID"},"type":"array"},"notes":{"description":"Notes holds notes associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3238-vulnerabilities-property---notes","items":{"$ref":"#/definitions/advisory.CSAFNote"},"type":"array"},"product_status":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Provide details on the status of the referenced product related to the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3239-vulnerabilities-property---product-status","type":"object"},"references":{"description":"Vulnerability references holds a list of references associated with this vulnerability item.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32310-vulnerabilities-property---references","items":{"$ref":"#/definitions/advisory.CSAFReference"},"type":"array"},"release_date":{"type":"string"},"remediations":{"description":"Provide details of remediations associated with a Vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32312-vulnerabilities-property---remediations","items":{"$ref":"#/definitions/advisory.RemediationData"},"type":"array"},"scores":{"description":"Scores holds the scores associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32313-vulnerabilities-property---scores\nCurrently only CVSS v3 is supported.","items":{"$ref":"#/definitions/advisory.CSAFScore"},"type":"array"},"threats":{"description":"Provide details of threats associated with a vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32314-vulnerabilities-property---threats","items":{"$ref":"#/definitions/advisory.ThreatData"},"type":"array"}},"type":"object"},"advisory.CVEDetail":{"properties":{"baseScore":{"type":"string"},"cveid":{"type":"string"},"description":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.CVEDetailsLink":{"properties":{"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.CVEReference":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CVRFReference":{"properties":{"description":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CVSS":{"properties":{"score":{"type":"string"},"severity":{"type":"string"},"type":{"type":"string"},"vector":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV2":{"properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"}},"type":"object"},"advisory.CVSSV3":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV40":{"properties":{"Automatable":{"type":"string"},"Recovery":{"type":"string"},"Safety":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityRequirement":{"type":"string"},"exploitMaturity":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackRequirements":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedSubAvailabilityImpact":{"type":"string"},"modifiedSubConfidentialityImpact":{"type":"string"},"modifiedSubIntegrityImpact":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"modifiedVulnAvailabilityImpact":{"type":"string"},"modifiedVulnConfidentialityImpact":{"type":"string"},"modifiedVulnIntegrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.CVSSV40Threat":{"properties":{"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"advisory.CWENode":{"properties":{"cweid":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.CanvasExploit":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"exploit_pack":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Capec":{"properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"advisory.CarestreamAdvisory":{"properties":{"carestream_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Carrier":{"properties":{"advisory_id":{"type":"string"},"affected_product":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CentosPackage":{"properties":{"filename":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CertBE":{"properties":{"affected_software":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability_type":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.CertFRAdvisory":{"properties":{"affected_systems_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"resume_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"source_fr":{"type":"string"},"title_fr":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIN":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIRSecurityAlert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_fa":{"type":"string"},"title_fa":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertSE":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary_sv":{"type":"string"},"title_sv":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertUA":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_ua":{"type":"string"},"title_ua":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ChainGuard":{"properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array"},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.ChainGuardPackage"},"type":"array"},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.ChainGuardPackage":{"properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/definitions/advisory.ChainGuardSecFix"},"type":"array"}},"type":"object"},"advisory.ChainGuardSecFix":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"version":{"type":"string"}},"type":"object"},"advisory.CheckPoint":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Chrome":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.AffectedChrome"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ciena":{"properties":{"cves":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"issue_no":{"type":"integer"},"security_advisory_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_products":{"items":{"$ref":"#/definitions/advisory.VulnerableProduct"},"type":"array"}},"type":"object"},"advisory.CisaCsafAdv":{"properties":{"csaf_json":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoAdvisory":{"properties":{"ciscoBugId":{"description":"multiple","type":"string"},"csaf":{"type":"string"},"cve":{"description":"multiple","items":{"type":"string"},"type":"array"},"cvrf":{"type":"string"},"cwe":{"description":"multiple","type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"identifier":{"type":"string"},"name":{"type":"string"},"related_resources":{"type":"string"},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"totalCount":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"},"workarounds":{"type":"string"},"workflowStatus":{"type":"string"}},"type":"object"},"advisory.CiscoCSAF":{"properties":{"csaf":{},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"identifier":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoKnownGoodValue":{"properties":{"biv_category":{"type":"string"},"biv_hash":{"type":"string"},"date_added":{"type":"string"},"dtype":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"platform":{"type":"string"},"published":{"type":"string"},"sha1":{"type":"string"},"sha256":{"type":"string"},"sha512":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CitrixAdvisory":{"properties":{"citrixId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.ClarotyVulnerability":{"properties":{"advisory_url":{"type":"string"},"claroty_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_v3":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"product":{"type":"string"},"target":{"type":"string"},"vendor":{"type":"string"},"vendor_advisory_url":{"type":"string"}},"type":"object"},"advisory.CloudBees":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CloudVulnDBAdvisory":{"properties":{"affectedServices":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CodesysAdvisory":{"properties":{"codesys_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVault":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cve_details":{"items":{"$ref":"#/definitions/advisory.CommVaultCVEDetails"},"type":"array"},"cvss_range":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"impacted_product":{"$ref":"#/definitions/advisory.CommVaultImpactedProduct"},"references":{"items":{"type":"string"},"type":"array"},"resolution":{"$ref":"#/definitions/advisory.CommVaultResolution"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVaultCVEDetails":{"properties":{"cve_id":{"type":"string"},"cvss":{"type":"string"},"description":{"type":"string"},"external_links":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.CommVaultImpactedProduct":{"properties":{"description":{"type":"string"},"impacted_product_details":{"items":{"$ref":"#/definitions/advisory.CommVaultImpactedProductDetails"},"type":"array"}},"type":"object"},"advisory.CommVaultImpactedProductDetails":{"properties":{"affected_versions":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array"},"product_name":{"type":"string"},"resolved_versions":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.CommVaultResolution":{"properties":{"description":{"type":"string"},"resolution_details":{"items":{"$ref":"#/definitions/advisory.CommVaultResolutionDetails"},"type":"array"}},"type":"object"},"advisory.CommVaultResolutionDetails":{"properties":{"feature_release":{"type":"string"},"maintenance_release":{"type":"string"}},"type":"object"},"advisory.CompassSecurity":{"properties":{"csnc_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"effect":{"type":"string"},"introduction":{"type":"string"},"product":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.ContainerOS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updates":{"items":{"$ref":"#/definitions/advisory.COSUpdate"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.CoreImpactExploit":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"platform":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Correction":{"properties":{"correctedAt":{"type":"string"},"orelease":{"type":"string"},"release":{"type":"string"}},"type":"object"},"advisory.Credit":{"properties":{"lang":{"type":"string"},"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Crestron":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"threat":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CrowdSec":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"eitw":{"type":"boolean"},"first_seen":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Curl":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"info":{"$ref":"#/definitions/advisory.OCurl"},"url":{"type":"string"}},"type":"object"},"advisory.CurlAffected":{"properties":{"ranges":{"items":{"$ref":"#/definitions/advisory.CurlRange"},"type":"array"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.CurlCWE":{"properties":{"desc":{"type":"string"},"id":{"type":"string"}},"type":"object"},"advisory.CurlCredit":{"properties":{"name":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.CurlRange":{"properties":{"events":{"items":{"additionalProperties":{"type":"string"},"type":"object"},"type":"array"},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Cvrf":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"notes":{"items":{"$ref":"#/definitions/advisory.DocumentNote"},"type":"array"},"productTree":{"$ref":"#/definitions/advisory.ProductTree"},"references":{"items":{"$ref":"#/definitions/advisory.CVRFReference"},"type":"array"},"title":{"type":"string"},"tracking":{"$ref":"#/definitions/advisory.DocumentTracking"},"vulnerabilities":{"items":{"$ref":"#/definitions/advisory.Vulnerability"},"type":"array"}},"type":"object"},"advisory.CvsssV2_3":{"properties":{"basescore":{"type":"string"},"temporalscore":{"type":"string"}},"type":"object"},"advisory.Cwe":{"properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.CweAcceptanceLevel":{"properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.CweData":{"properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Cwes":{"properties":{"nodes":{"items":{"$ref":"#/definitions/advisory.CWENode"},"type":"array"},"totalCount":{"type":"integer"}},"type":"object"},"advisory.Cycle":{"properties":{"codename":{"type":"string"},"cycle":{"type":"string"},"discontinued":{},"eol":{},"extendedSupport":{},"latest":{"type":"string"},"latestReleaseDate":{"type":"string"},"link":{"type":"string"},"lts":{},"releaseDate":{"type":"string"},"releaseLabel":{"type":"string"},"support":{}},"type":"object"},"advisory.DBSpecific":{"properties":{"CWE":{"$ref":"#/definitions/advisory.CurlCWE"},"award":{"$ref":"#/definitions/advisory.Award"},"last_affected":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"url":{"type":"string"},"www":{"type":"string"}},"type":"object"},"advisory.DFNCert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary_de":{"type":"string"},"title_de":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DLink":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DNN":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dahua":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DanFossCVEDetails":{"properties":{"base_score":{"type":"string"},"cve":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Danfoss":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cve_details":{"items":{"$ref":"#/definitions/advisory.DanFossCVEDetails"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dassault":{"properties":{"affected_products":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DateTime":{"properties":{"date":{"type":"string"}},"type":"object"},"advisory.DebianCVE":{"properties":{"cve":{"type":"string"},"debianbug":{"type":"integer"},"description":{"type":"string"},"releases":{"items":{"$ref":"#/definitions/advisory.AffectedDebianRelease"},"type":"array"},"scope":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DebianSecurityAdvisory":{"properties":{"affected_packages":{"items":{"$ref":"#/definitions/advisory.AffectedDebianPackage"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"dsa":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dell":{"properties":{"articleNumber":{"type":"string"},"combinedProductList":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"dell_cves":{"items":{"$ref":"#/definitions/advisory.DellCVE"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DellCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.DeltaAdvisory":{"properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"recommendedAction":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.DistroPackage":{"properties":{"binary":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array"},"license":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"},"secFixes":{"items":{"$ref":"#/definitions/advisory.SecFix"},"type":"array"},"versions":{"items":{"$ref":"#/definitions/advisory.DistroVersion"},"type":"array"}},"type":"object"},"advisory.DistroVersion":{"properties":{"arch":{"type":"string"},"published_date":{"type":"string"},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Django":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DocumentMetadata":{"properties":{"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/definitions/advisory.CSAFDistribution"},"lang":{"type":"string"},"notes":{"description":"used by ncsc","items":{"$ref":"#/definitions/advisory.CSAFNote"},"type":"array"},"publisher":{"$ref":"#/definitions/advisory.Publisher"},"references":{"items":{"$ref":"#/definitions/advisory.CSAFReference"},"type":"array"},"title":{"description":"Aggregate severity is a vehicle that is provided by the document producer to convey the urgency and\ncriticality with which the one or more vulnerabilities reported should be addressed.","type":"string"},"tracking":{"$ref":"#/definitions/advisory.Tracking"}},"type":"object"},"advisory.DocumentNote":{"properties":{"text":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.DocumentPublisher":{"properties":{"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"type":{"description":"the json for this is missing/broke","type":"integer"}},"type":"object"},"advisory.DocumentTracking":{"properties":{"currentReleaseDate":{"type":"string"},"id":{"type":"string"},"initialReleaseDate":{"type":"string"},"revisionHistory":{"items":{"$ref":"#/definitions/advisory.Revision"},"type":"array"},"status":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.DotCMS":{"properties":{"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"issue_id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DragosAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.Draytek":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Drupal":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"project":{"type":"string"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLAlibaba":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"eol_date":{"type":"string"},"eol_name":{"type":"string"},"product":{"type":"string"},"release_date":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.EOLMicrosoft":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"edition":{"type":"string"},"extended_end_date":{"type":"string"},"mainstream_date":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"release_end_date":{"type":"string"},"release_start_date":{"type":"string"},"retirement_date":{"type":"string"},"start_date":{"type":"string"},"support_policy":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLReleaseData":{"properties":{"already_eol":{"type":"boolean"},"branch":{"description":"Alpine Linux","type":"string"},"branch_url":{"description":"Alpine Linux","type":"string"},"codename":{"type":"string"},"cpe":{"type":"string"},"eol_date":{"type":"string"},"eol_date_extended_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_date_premier_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_elts_date":{"type":"string"},"eol_lts_date":{"type":"string"},"git_branch":{"description":"Alpine Linux","type":"string"},"git_branch_url":{"description":"Alpine Linux","type":"string"},"lts":{"description":"Ubuntu","type":"boolean"},"minor_releases":{"description":"Alpine Linux","items":{"type":"string"},"type":"array"},"product":{"type":"string"},"release_date":{"type":"string"},"release_name":{"type":"string"},"source_url":{"type":"string"},"technology_level":{"description":"AIX","type":"string"},"vendor":{"type":"string"},"version":{"type":"string"},"version_api":{"description":"Android","type":"string"},"version_darwin":{"description":"macOS","type":"string"},"version_sunos":{"description":"Solaris","type":"string"},"windows_current_build":{"description":"Microsoft Windows","type":"string"},"windows_display_version":{"description":"Microsoft Windows","type":"string"},"windows_edition_id":{"description":"Microsoft Windows","type":"string"},"windows_insider_preview":{"description":"Microsoft Windows","type":"boolean"}},"type":"object"},"advisory.EUVD":{"properties":{"aliases":{"items":{"type":"string"},"type":"array"},"assigner":{"type":"string"},"base_score":{"type":"number"},"base_score_vector":{"type":"string"},"base_score_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"enisa_id_product":{"items":{"$ref":"#/definitions/advisory.EnisaIDProduct"},"type":"array"},"enisa_id_vendor":{"items":{"$ref":"#/definitions/advisory.EnisaIDVendor"},"type":"array"},"epss":{"type":"number"},"exploited":{"description":"This field is exploited field from endpoint /api/vulnerabilities.\napidocs : https://euvd.enisa.europa.eu/apidoc\nNote: There are records where exploited_since is populated with a valid date,\nbut it still shows up under non_exploitable data set","type":"boolean"},"exploited_since":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.EatonAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"eaton_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EcoSystem":{"properties":{"severity":{"type":"string"},"spl":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Elastic":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"esaid":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Elspec":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmergingThreatsSnort":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"rev":{"type":"string"},"rule_disabled":{"type":"boolean"},"rule_name":{"type":"string"},"sid":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmersonAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"emerson_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EndOfLife":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cycles":{"items":{"$ref":"#/definitions/advisory.Cycle"},"type":"array"},"date_added":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Endress":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EnisaIDProduct":{"properties":{"id":{"type":"string"},"product_name":{"type":"string"},"product_version":{"type":"string"}},"type":"object"},"advisory.EnisaIDVendor":{"properties":{"id":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.Event":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"},"last_affected":{"type":"string"},"limit":{"type":"string"}},"type":"object"},"advisory.ExodusIntel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"disclosed_public":{"type":"string"},"disclosed_vendor":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExploitDBExploitv2":{"properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"edb_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExternalReferences":{"properties":{"description":{"type":"string"},"external_id":{"type":"string"},"source_name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.F5":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FSecure":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fanuc":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fastly":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Festo":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileCloud":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileZilla":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FixAff":{"properties":{"affected_since":{"type":"string"},"fixed_version":{"type":"string"},"patch_url":{"type":"string"}},"type":"object"},"advisory.Flag":{"properties":{"date":{"type":"string"},"group_ids":{"items":{"type":"string"},"type":"array"},"label":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.FlattSecurity":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ForgeRock":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FortinetAdvisory":{"properties":{"acknowledgement":{"type":"string"},"affectedProducts":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvssv3":{"type":"string"},"date_added":{"type":"string"},"irnumber":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solutions":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.FortinetIPS":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"epss":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Foxit":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.FoxitAffected"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FoxitAffected":{"properties":{"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Fresenius":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GCP":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEGas":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEHealthcareAdvisory":{"properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHAdvisoryJSONLean":{"properties":{"classification":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"$ref":"#/definitions/advisory.GHCvss"},"cwes":{"$ref":"#/definitions/advisory.Cwes"},"databaseId":{"type":"integer"},"date_added":{"type":"string"},"description":{"type":"string"},"ghsaId":{"type":"string"},"id":{"type":"string"},"identifiers":{"items":{"$ref":"#/definitions/advisory.GHIdentifier"},"type":"array"},"notificationsPermalink":{"type":"string"},"origin":{"type":"string"},"permalink":{"type":"string"},"publishedAt":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.GHReference"},"type":"array"},"severity":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"vulnerabilities":{"$ref":"#/definitions/advisory.GHVulnerabilities"},"withdrawnAt":{"type":"string"}},"type":"object"},"advisory.GHCvss":{"properties":{"score":{"type":"number"},"vectorString":{"type":"string"}},"type":"object"},"advisory.GHIdentifier":{"properties":{"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.GHNode":{"properties":{"package":{"$ref":"#/definitions/advisory.GHPackage"},"severity":{"type":"string"},"updatedAt":{"type":"string"},"vulnerableVersionRange":{"type":"string"}},"type":"object"},"advisory.GHPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHReference":{"properties":{"url":{"type":"string"}},"type":"object"},"advisory.GHSA":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"ghsa":{"$ref":"#/definitions/advisory.OriginalGHSA"},"url":{"type":"string"}},"type":"object"},"advisory.GHSAAffected":{"properties":{"ecosystem_specific":{"$ref":"#/definitions/advisory.GHSAEcoSystemSpecific"},"package":{"$ref":"#/definitions/advisory.GHSAPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.GHSARange"},"type":"array"}},"type":"object"},"advisory.GHSADatabaseSpecific":{"properties":{"cwe_ids":{"items":{"type":"string"},"type":"array"},"github_reviewed":{"type":"boolean"},"github_reviewed_at":{"type":"string"},"nvd_published_at":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.GHSAEcoSystemSpecific":{"properties":{"affected_functions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.GHSAEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GHSAPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHSARange":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.GHSAEvent"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.GHSAReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHSASeverity":{"properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.GHVulnerabilities":{"properties":{"nodes":{"items":{"$ref":"#/definitions/advisory.GHNode"},"type":"array"},"totalCount":{"type":"integer"}},"type":"object"},"advisory.GMOCyberSecurity":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gallagher":{"properties":{"activeExploitation":{"type":"boolean"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fixes":{"type":"string"},"reportedBy":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gen":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"description":"not all of them have this","type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Genetec":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gigabyte":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.GitHubExploit":{"properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"currently_trending":{"type":"boolean"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"id":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitLabExploit":{"properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GiteeExploit":{"properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitlabAdvisory":{"properties":{"affected_range":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_v2":{"type":"string"},"cvss_v3":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array"},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"fixed_versions":{"items":{"type":"string"},"type":"array"},"ghsa":{"items":{"type":"string"},"type":"array"},"gitlab_url":{"type":"string"},"identifier":{"type":"string"},"identifiers":{"items":{"type":"string"},"type":"array"},"not_impacted":{"type":"string"},"package_manager":{"type":"string"},"package_name":{"type":"string"},"package_slug":{"type":"string"},"pubdate":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"urls":{"items":{"type":"string"},"type":"array"},"uuid":{"type":"string"}},"type":"object"},"advisory.Glibc":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GnuTLS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GoCredits":{"properties":{"name":{"type":"string"}},"type":"object"},"advisory.GoEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GoVulnAffected":{"properties":{"database_specific":{"$ref":"#/definitions/advisory.GoVulnDatabaseSpecific"},"ecosystem_specific":{"$ref":"#/definitions/advisory.GoVulnEcosystemSpecific"},"package":{"$ref":"#/definitions/advisory.GoVulnPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.GoVulnRanges"},"type":"array"}},"type":"object"},"advisory.GoVulnDatabaseSpecific":{"properties":{"url":{"type":"string"}},"type":"object"},"advisory.GoVulnEcosystemSpecific":{"properties":{"imports":{"items":{"$ref":"#/definitions/advisory.GoVulnImport"},"type":"array"}},"type":"object"},"advisory.GoVulnImport":{"properties":{"path":{"type":"string"},"symbols":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.GoVulnJSON":{"properties":{"advisory_url":{"type":"string"},"affected":{"items":{"$ref":"#/definitions/advisory.GoVulnAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"credits":{"items":{"$ref":"#/definitions/advisory.GoCredits"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"ghsa":{"items":{"type":"string"},"type":"array"},"go_advisory_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.GoVulnReference"},"type":"array"}},"type":"object"},"advisory.GoVulnPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GoVulnRanges":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.GoEvent"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.GoVulnReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Grafana":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseDetection":{"properties":{"category":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"label":{"type":"string"},"name":{"type":"string"},"recommend_block":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array"},"related_tags":{"items":{"$ref":"#/definitions/advisory.GreyNoiseTags"},"type":"array"},"slug":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseTags":{"properties":{"category":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"name":{"type":"string"},"slug":{"type":"string"}},"type":"object"},"advisory.HCL":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HIKVision":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.HKCert":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"relatedLinks":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"solutions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.HMS":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HP":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.HPE":{"properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hacktivity":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"float64":{"type":"number"},"rank":{"type":"integer"},"reports_submitted":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HardwareUpdate":{"properties":{"affectedVersions":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"hardwarePlatform":{"type":"string"},"system":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.HarmonyOS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HashiCorp":{"properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HaskellAffected":{"properties":{"affected_constraint":{"type":"string"},"affected_versions":{"items":{"$ref":"#/definitions/advisory.HaskellVersion"},"type":"array"},"arch":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"os":{"items":{"type":"string"},"type":"array"},"package":{"type":"string"}},"type":"object"},"advisory.HaskellSADBAdvisory":{"properties":{"advisory_id":{"type":"string"},"affected_packages":{"items":{"$ref":"#/definitions/advisory.HaskellAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cwes":{"items":{"type":"integer"},"type":"array"},"date_added":{"type":"string"},"keywords":{"items":{"type":"string"},"type":"array"},"references":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"type":"object"},"related_vulns":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.HaskellVersion":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.HillromAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hitachi":{"properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixedProducts":{"type":"string"},"hitachiId":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HitachiEnergy":{"properties":{"advisory_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"exploited":{"type":"boolean"},"products":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Honeywell":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Huawei":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"sa_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiEulerOS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"packages":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"synopsis":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiIPS":{"properties":{"cnnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"name":{"type":"string"},"severity":{"type":"string"},"threat_id":{"type":"integer"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.IAVA":{"properties":{"IAVA":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.IBM":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ITW":{"properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.ITWExploit":{"properties":{"advisory":{"type":"string"},"affected_versions":{"type":"string"},"analysis_url":{"type":"string"},"bug_introducing_change_list_url":{"type":"string"},"claimed_attribution":{"type":"string"},"claimed_attribution_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_discovered":{"type":"string"},"date_patched":{"type":"string"},"description":{"type":"string"},"first_patched_version":{"type":"string"},"patch_change_list_url":{"type":"string"},"product":{"type":"string"},"reported_by":{"type":"string"},"root_cause_analysis_url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_type":{"type":"string"}},"type":"object"},"advisory.IVal":{"properties":{"Value":{"type":"string"}},"type":"object"},"advisory.Idemia":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"sbid":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IdentificationHelper":{"additionalProperties":true,"type":"object"},"advisory.Igel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Impact":{"properties":{"capecId":{"type":"string"},"descriptions":{"items":{"$ref":"#/definitions/advisory.MDescriptions"},"type":"array"}},"type":"object"},"advisory.IncibeAdvisory":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"detail":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Intel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.IpIntelRecord":{"properties":{"asn":{"type":"string"},"city":{"type":"string"},"country":{"type":"string"},"country_code":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"feed_ids":{"items":{"type":"string"},"type":"array"},"hostnames":{"items":{"type":"string"},"type":"array"},"ip":{"type":"string"},"lastSeen":{"type":"string"},"matches":{"items":{"type":"string"},"type":"array"},"port":{"type":"integer"},"ssl":{"type":"boolean"},"type":{"$ref":"#/definitions/advisory.RecordType"}},"type":"object"},"advisory.IsraeliAlert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details_he":{"type":"string"},"handling_he":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_he":{"type":"string"},"title_he":{"type":"string"}},"type":"object"},"advisory.IsraeliVulnerability":{"properties":{"ILVNId":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Issued":{"properties":{"date":{"type":"string"}},"type":"object"},"advisory.Istio":{"properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ivanti":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IvantiRSS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JFrog":{"properties":{"cpes":{"items":{"$ref":"#/definitions/advisory.NVD20CVECPEMatch"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"product":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.JNJAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVN":{"properties":{"affected_en":{"type":"string"},"affected_ja":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description_en":{"type":"string"},"description_ja":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution_en":{"type":"string"},"solution_ja":{"type":"string"},"summary_en":{"type":"string"},"summary_ja":{"type":"string"},"title_en":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVNAdvisoryItem":{"properties":{"cpe":{"items":{"$ref":"#/definitions/advisory.JVNCPE"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"items":{"$ref":"#/definitions/advisory.CVSS"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"description_en":{"type":"string"},"identifier":{"type":"string"},"issued":{"type":"string"},"modified":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.JVNReference"},"type":"array"},"title":{"type":"string"},"title_en":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"url_en":{"type":"string"}},"type":"object"},"advisory.JVNCPE":{"properties":{"cpe":{"type":"string"},"product":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.JVNReference":{"properties":{"id":{"type":"string"},"source":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Jenkins":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fix":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.JetBrains":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"resolved_in":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JohnsonControls":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Juniper":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss3_score":{"type":"string"},"cvss3_vector":{"type":"string"},"cvss4_score":{"type":"string"},"cvss4_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.K8S":{"properties":{"content":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"issue_id":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.KEVCatalogVulnerability":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwes":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"notes":{"type":"string"},"product":{"type":"string"},"requiredAction":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.KRCertAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description_ko":{"type":"string"},"link":{"type":"string"},"overview_ko":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title_ko":{"type":"string"}},"type":"object"},"advisory.KasperskyICSCERTAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"klcert_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kb":{"properties":{"kb_url":{"type":"string"},"ms_date_added":{"type":"string"},"status":{"type":"string"},"supercedence":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.KbThreatDescription":{"properties":{"dos":{"type":"string"},"exploited":{"type":"string"},"latest_software_release":{"type":"string"},"level":{"items":{"type":"string"},"type":"array"},"older_software_release":{"type":"string"},"publicly_disclosed":{"type":"string"},"type":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.KoreLogic":{"properties":{"affected_product":{"type":"string"},"affected_vendor":{"type":"string"},"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kunbus":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LG":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lantronix":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lenovo":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"industry_identifiers":{"items":{"type":"string"},"type":"array"},"last_updated":{"type":"string"},"lenovo_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LexmarkAdvisory":{"properties":{"affectedProducts":{"items":{"$ref":"#/definitions/advisory.AffectedProduct"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"impact":{"type":"string"},"lastUpdate":{"type":"string"},"link":{"type":"string"},"publicReleaseDate":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"revision":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"workarounds":{"type":"string"}},"type":"object"},"advisory.LibreOffice":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Linux":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LogSource":{"properties":{"category":{"type":"string"},"definition":{"type":"string"},"product":{"type":"string"},"service":{"type":"string"}},"type":"object"},"advisory.LolAdvs":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"lol_json":{"additionalProperties":{},"type":"object"},"mitre_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MACert":{"properties":{"affected_systems_fr":{"type":"string"},"assessment_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"impact_fr":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"title_fr":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MAffected":{"properties":{"collectionURL":{"type":"string"},"cpes":{"items":{"type":"string"},"type":"array"},"defaultStatus":{"type":"string"},"packageName":{"type":"string"},"packageURL":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array"},"product":{"type":"string"},"repo":{"type":"string"},"vendor":{"type":"string"},"versions":{"items":{"$ref":"#/definitions/advisory.MVersion"},"type":"array"}},"type":"object"},"advisory.MBranch":{"properties":{"Branch":{"items":{"$ref":"#/definitions/advisory.MBranch"},"type":"array"},"FullProductName":{"items":{"$ref":"#/definitions/advisory.MFullProductName"},"type":"array"},"Items":{"items":{"$ref":"#/definitions/advisory.MItem"},"type":"array"},"name":{"type":"string"},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MCPEApplicability":{"properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/definitions/advisory.MNodes"},"type":"array"},"operator":{"type":"string"}},"type":"object"},"advisory.MCPEMatch":{"properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.MCna":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.MAffected"},"type":"array"},"cpeApplicability":{"items":{"$ref":"#/definitions/advisory.MCPEApplicability"},"type":"array"},"credits":{"items":{"$ref":"#/definitions/advisory.Credit"},"type":"array"},"descriptions":{"items":{"$ref":"#/definitions/advisory.MDescriptions"},"type":"array"},"impacts":{"items":{"$ref":"#/definitions/advisory.Impact"},"type":"array"},"metrics":{"items":{"$ref":"#/definitions/advisory.Metric"},"type":"array"},"problemTypes":{"items":{"$ref":"#/definitions/advisory.MProblemTypes"},"type":"array"},"providerMetadata":{"$ref":"#/definitions/advisory.MProviderMetadata"},"references":{"items":{"$ref":"#/definitions/advisory.MReference"},"type":"array"},"tags":{"items":{"type":"string"},"type":"array"},"timeline":{"items":{"$ref":"#/definitions/advisory.Timeline"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.MContainers":{"properties":{"adp":{"items":{"$ref":"#/definitions/advisory.ADPContainer"},"type":"array"},"cna":{"$ref":"#/definitions/advisory.MCna"}},"type":"object"},"advisory.MCveMetadata":{"properties":{"assignerOrgId":{"type":"string"},"assignerShortName":{"type":"string"},"cveId":{"type":"string"},"datePublished":{"type":"string"},"dateReserved":{"type":"string"},"dateUpdated":{"type":"string"},"state":{"type":"string"}},"type":"object"},"advisory.MCvssV20":{"properties":{"accessVector":{"type":"string"},"attackComplexity":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV30":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV31":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV40":{"properties":{"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"automatable":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"recovery":{"type":"string"},"safety":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.MDescriptions":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MDocumentTracking":{"properties":{"CurrentReleaseDate":{"type":"string"},"InitialReleaseDate":{"type":"string"},"identification":{"$ref":"#/definitions/advisory.MIdentification"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/definitions/advisory.RRevision"},"type":"array"},"status":{"description":"again - change in json/xml","type":"integer"},"version":{"type":"string"}},"type":"object"},"advisory.MEProduct":{"properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.MFiles":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MFullProductName":{"properties":{"CPE":{"type":"string"},"ProductID":{"type":"string"},"Value":{"type":"string"}},"type":"object"},"advisory.MISPValueNoID":{"properties":{"description":{"type":"string"},"meta":{"$ref":"#/definitions/advisory.MispMeta"},"related":{"items":{"$ref":"#/definitions/advisory.MispRelatedItem"},"type":"array"},"value":{"type":"string"}},"type":"object"},"advisory.MITREAttackGroupNoID":{"properties":{"aliases":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"name":{"type":"string"},"techniques":{"items":{"$ref":"#/definitions/advisory.MitreAttackTechnique"},"type":"array"}},"type":"object"},"advisory.MIdentification":{"properties":{"alias":{"$ref":"#/definitions/advisory.IVal"},"id":{"$ref":"#/definitions/advisory.IVal"}},"type":"object"},"advisory.MItem":{"properties":{"Items":{"items":{"$ref":"#/definitions/advisory.MItem"},"type":"array"},"Name":{"type":"string"},"ProductID":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Value":{"type":"string"}},"type":"object"},"advisory.MNodes":{"properties":{"cpeMatch":{"items":{"$ref":"#/definitions/advisory.MCPEMatch"},"type":"array"},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.MProblemTypes":{"properties":{"descriptions":{"items":{"$ref":"#/definitions/advisory.PTMDescriptions"},"type":"array"}},"type":"object"},"advisory.MProductStatus":{"properties":{"ProductID":{"items":{"type":"string"},"type":"array"},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MProductTree":{"properties":{"Branch":{"items":{"$ref":"#/definitions/advisory.MBranch"},"type":"array"},"FullProductName":{"items":{"$ref":"#/definitions/advisory.MFullProductName"},"type":"array"}},"type":"object"},"advisory.MProviderMetadata":{"properties":{"dateUpdated":{"description":"FIXME: flip to time","type":"string"},"orgId":{"type":"string"},"shortName":{"type":"string"}},"type":"object"},"advisory.MReference":{"properties":{"name":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.MRemediation":{"properties":{"AffectedFiles":{"items":{"$ref":"#/definitions/advisory.AffectedFile"},"type":"array"},"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/definitions/advisory.IVal"},"FixedBuild":{"type":"string"},"ProductID":{"items":{"type":"string"},"type":"array"},"RestartRequired":{"$ref":"#/definitions/advisory.IVal"},"SubType":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Url":{"type":"string"},"supercedence":{"type":"string"}},"type":"object"},"advisory.MSCVRF":{"properties":{"DocumentTitle":{"$ref":"#/definitions/advisory.MSDocumentTitle"},"DocumentTracking":{"$ref":"#/definitions/advisory.MDocumentTracking"},"ProductTree":{"$ref":"#/definitions/advisory.MProductTree"},"document_type":{"type":"string"},"documentnotes":{"description":"diff","items":{"$ref":"#/definitions/advisory.RNote"},"type":"array"},"documentpublisher":{"$ref":"#/definitions/advisory.DocumentPublisher"},"vulnerability":{"items":{"$ref":"#/definitions/advisory.MVulnerability"},"type":"array"}},"type":"object"},"advisory.MSDocumentTitle":{"properties":{"Value":{"type":"string"}},"type":"object"},"advisory.MVersion":{"properties":{"lessThan":{"type":"string"},"lessThanOrEqual":{"type":"string"},"status":{"type":"string"},"version":{"type":"string"},"versionType":{"type":"string"}},"type":"object"},"advisory.MVulnerability":{"properties":{"ProductStatuses":{"items":{"$ref":"#/definitions/advisory.MProductStatus"},"type":"array"},"Remediations":{"items":{"$ref":"#/definitions/advisory.MRemediation"},"type":"array"},"Threats":{"items":{"$ref":"#/definitions/advisory.RThreat"},"type":"array"},"acknowledgments":{"items":{"$ref":"#/definitions/advisory.Acknowledgement"},"type":"array"},"cve":{"type":"string"},"cvssscoresets":{"items":{"$ref":"#/definitions/advisory.RScoreSet"},"type":"array"},"notes":{"items":{"$ref":"#/definitions/advisory.Note"},"type":"array"},"ordinal":{"type":"string"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/definitions/advisory.RRevision"},"type":"array"},"title":{"$ref":"#/definitions/advisory.IVal"}},"type":"object"},"advisory.MaliciousPackage":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"malware":{"$ref":"#/definitions/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ManageEngine":{"properties":{"ADVISORY":{"type":"string"},"Added_Time":{"type":"string"},"CVE_Details_Link":{"$ref":"#/definitions/advisory.CVEDetailsLink"},"CVE_ID":{"type":"string"},"CVSS_Severity_Rating":{"type":"string"},"Fixed":{"type":"string"},"For_product_search":{"type":"string"},"ID":{"type":"string"},"Product":{"$ref":"#/definitions/advisory.MEProduct"},"Product_list":{"items":{"$ref":"#/definitions/advisory.MEProduct"},"type":"array"},"Product_specific_details":{"items":{"$ref":"#/definitions/advisory.ProductSpecificDetail"},"type":"array"},"Summary":{"type":"string"},"Version":{"type":"string"},"index_field":{"type":"string"}},"type":"object"},"advisory.ManageEngineAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"manage_engine":{"$ref":"#/definitions/advisory.ManageEngine"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MbedTLS":{"properties":{"affects":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfee":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mcafee_score":{"items":{"$ref":"#/definitions/advisory.McAfeeScore"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfeeScore":{"properties":{"base":{"type":"string"},"cve":{"type":"string"},"temporal":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.Mediatek":{"properties":{"affected_chipsets":{"items":{"type":"string"},"type":"array"},"affected_software":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MedtronicAdvisory":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mendix":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"id":{"type":"string"},"mendix_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaAdvisories":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.MAffected"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaData":{"properties":{"advisory":{"$ref":"#/definitions/advisory.AdvisoryDetails"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.VulnCheckPackage"},"type":"array"},"references":{"items":{"$ref":"#/definitions/advisory.OvalReference"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.MetasploitExploit":{"properties":{"author":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Metric":{"properties":{"cvssV2_0":{"$ref":"#/definitions/advisory.MCvssV20"},"cvssV3_0":{"$ref":"#/definitions/advisory.MCvssV30"},"cvssV3_1":{"$ref":"#/definitions/advisory.MCvssV31"},"cvssV4_0":{"$ref":"#/definitions/advisory.MCvssV40"},"format":{"type":"string"},"other":{"$ref":"#/definitions/advisory.MetricsOther"},"scenarios":{"items":{"$ref":"#/definitions/advisory.MetricScenario"},"type":"array"}},"type":"object"},"advisory.MetricScenario":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MetricsOther":{"properties":{"content":{"type":"object"},"type":{"type":"string"}},"type":"object"},"advisory.MicrosoftCSAF":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftCVRF":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvrf":{"$ref":"#/definitions/advisory.MSCVRF"},"date_added":{"type":"string"},"exploited_list":{"items":{"$ref":"#/definitions/advisory.ITW"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftDriverBlockList":{"properties":{"date_added":{"type":"string"},"file_id":{"description":"From FileAttrib or Deny","type":"string"},"file_metadata":{"allOf":[{"$ref":"#/definitions/advisory.MicrosoftFileMetadata"}],"description":"File-level metadata"}},"type":"object"},"advisory.MicrosoftFileMetadata":{"properties":{"file_name":{"description":"Full path (FilePath + FileName or FriendlyName)","type":"string"},"maximum_file_version":{"type":"string"},"minimum_file_version":{"type":"string"},"product_name":{"type":"string"},"sha1_hash":{"type":"string"},"sha256_hash":{"type":"string"}},"type":"object"},"advisory.MicrosoftKb":{"properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"kbs":{"items":{"$ref":"#/definitions/advisory.Kb"},"type":"array"},"threat":{"$ref":"#/definitions/advisory.KbThreatDescription"},"title":{"type":"string"}},"type":"object"},"advisory.Mikrotik":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mindray":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MispMeta":{"properties":{"attribution-confidence":{"type":"string"},"cfr-suspected-state-sponsor":{"type":"string"},"cfr-suspected-victims":{"items":{"type":"string"},"type":"array"},"cfr-target-category":{"items":{"type":"string"},"type":"array"},"cfr-type-of-incident":{"items":{"type":"string"},"type":"array"},"country":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array"},"synonyms":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.MispRelatedItem":{"properties":{"dest-uuid":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.MispValue":{"properties":{"description":{"type":"string"},"meta":{"$ref":"#/definitions/advisory.MispMeta"},"related":{"items":{"$ref":"#/definitions/advisory.MispRelatedItem"},"type":"array"},"uuid":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Mitel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackRef":{"properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechWithRefs":{"properties":{"domain":{"type":"string"},"id":{"type":"string"},"name":{"type":"string"},"nist_controls":{"items":{"$ref":"#/definitions/advisory.NISTControl"},"type":"array"},"references":{"items":{"$ref":"#/definitions/advisory.MitreAttackRef"},"type":"array"},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechnique":{"properties":{"sub_technique":{"type":"string"},"sub_technique_name":{"type":"string"},"tactic":{"items":{"type":"string"},"type":"array"},"technique_id":{"type":"string"},"technique_name":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/definitions/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5Ref":{"properties":{"containers":{"$ref":"#/definitions/advisory.MContainers"},"cveMetadata":{"$ref":"#/definitions/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.MitreGroupCTI":{"properties":{"aliases":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.ExternalReferences"},"type":"array"}},"type":"object"},"advisory.MitsubishiElectricAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"description":"could nuke this at some pt in the future as it's a dupe","type":"string"},"mitsubishi_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MongoDB":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MoxaAdvisory":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaAdvisory":{"properties":{"affected_components":{"items":{"$ref":"#/definitions/advisory.MozillaComponent"},"type":"array"},"bugzilla":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_in":{"items":{"type":"string"},"type":"array"},"impact":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"reporter":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaComponent":{"properties":{"bugzilla":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"description":{"type":"string"},"impact":{"type":"string"},"reporter":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.NCSC":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NCSCCVE":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NEC":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"nvd_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NHS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"summary":{"type":"string"},"threat_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NI":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"ovewrview":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NISTControl":{"properties":{"cis_controls":{"items":{"$ref":"#/definitions/advisory.CISControl"},"type":"array"},"nist_control_family":{"type":"string"},"nist_control_id":{"type":"string"},"nist_control_name":{"type":"string"}},"type":"object"},"advisory.NTP":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NVD20CVECPEMatch":{"properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.NVD20Configuration":{"properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/definitions/advisory.NVD20Node"},"type":"array"},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Node":{"properties":{"cpeMatch":{"items":{"$ref":"#/definitions/advisory.NVD20CVECPEMatch"},"type":"array"},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Source":{"properties":{"contactEmail":{"type":"string"},"created":{"type":"string"},"cweAcceptanceLevel":{"$ref":"#/definitions/advisory.CweAcceptanceLevel"},"lastModified":{"type":"string"},"name":{"type":"string"},"sourceIdentifiers":{"items":{"type":"string"},"type":"array"},"v3AcceptanceLevel":{"$ref":"#/definitions/advisory.V3AcceptanceLevel"}},"type":"object"},"advisory.NVDCPEDictionary":{"properties":{"backupOnly":{"type":"string"}},"type":"object"},"advisory.NZAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"happening":{"type":"string"},"link":{"type":"string"},"lookFor":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"whatToDo":{"type":"string"}},"type":"object"},"advisory.Naver":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nessus":{"properties":{"cpe":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"exploitability_ease":{"description":"seems like only 3 vals for this","type":"string"},"filename":{"type":"string"},"iava":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"},"script_id":{"type":"integer"},"updated":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NetApp":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"impact":{"type":"string"},"ntap":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netatalk":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgate":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgear":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"psvn_number":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netskope":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nexpose":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"identifier":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NginxAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"not_vuln_versions":{"items":{"type":"string"},"type":"array"},"patch_pgp":{"type":"string"},"patch_url":{"type":"string"},"severity":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vuln_versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.NodeAuthor":{"properties":{"author":{"type":"string"},"username":{"type":"string"},"website":{"type":"string"}},"type":"object"},"advisory.NodeJS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NodeSecurity":{"properties":{"affected_environments":{"items":{"type":"string"},"type":"array"},"author":{"$ref":"#/definitions/advisory.NodeAuthor"},"coordinating_vendor":{"type":"string"},"created_at":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"number"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"module_name":{"type":"string"},"overview":{"type":"string"},"patched_versions":{"type":"string"},"publish_date":{"type":"string"},"recommendation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerable_versions":{"type":"string"}},"type":"object"},"advisory.Nokia":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Note":{"properties":{"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"type":"integer"}},"type":"object"},"advisory.NotePadPlusPlus":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nozomi":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nuclei":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"template":{"type":"object"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NvidiaRevision":{"properties":{"date":{"type":"string"},"description":{"type":"string"},"revision":{"type":"string"}},"type":"object"},"advisory.OCurl":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.CurlAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"credits":{"items":{"$ref":"#/definitions/advisory.CurlCredit"},"type":"array"},"database_specific":{"$ref":"#/definitions/advisory.DBSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"schema_version":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.OSV":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"osv":{"$ref":"#/definitions/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OSVObj":{"properties":{"affected":{"description":"collection based on https://ossf.github.io/osv-schema/","items":{"$ref":"#/definitions/advisory.Affected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.OSVReference"},"type":"array"},"related":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"withdrawn":{"type":"string"}},"type":"object"},"advisory.OSVPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.OSVReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OTRS":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OctopusDeploy":{"properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Okta":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"resolution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Omron":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OneE":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenBSD":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"patch":{"type":"string"},"release":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenCVDB":{"properties":{"affected_platforms":{"items":{"type":"string"},"type":"array"},"affected_services":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"disclosed_at":{"type":"string"},"known_itw_exploitation":{"type":"boolean"},"manual_remediation":{"type":"string"},"published_at":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDK":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"openjdk_cves":{"items":{"$ref":"#/definitions/advisory.OpenJDKCVE"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDKCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.OpenSSH":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenSSLSecAdv":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/definitions/advisory.OpenSSLVulnerability"},"type":"array"}},"type":"object"},"advisory.OpenSSLVulnerability":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"fixed":{"items":{"$ref":"#/definitions/advisory.FixAff"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OpenStack":{"properties":{"affects":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Opengear":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPU":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"product":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPUCSAF":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OriginalGHSA":{"properties":{"affected":{"items":{"$ref":"#/definitions/advisory.GHSAAffected"},"type":"array"},"aliases":{"items":{"type":"string"},"type":"array"},"database_specific":{"$ref":"#/definitions/advisory.GHSADatabaseSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.GHSAReference"},"type":"array"},"schema_version":{"type":"string"},"severity":{"items":{"$ref":"#/definitions/advisory.GHSASeverity"},"type":"array"},"summary":{"type":"string"}},"type":"object"},"advisory.OvalCVE":{"properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OvalReference":{"properties":{"ref_id":{"type":"string"},"ref_url":{"type":"string"},"source":{"type":"string"}},"type":"object"},"advisory.Override":{"properties":{"_annotation":{"$ref":"#/definitions/advisory.OverrideAnnotation"},"cve":{"$ref":"#/definitions/advisory.OverrideCVE"}},"type":"object"},"advisory.OverrideAnnotation":{"properties":{"cve_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"reason":{"type":"string"},"snapshot":{"type":"string"},"triage_notes":{"$ref":"#/definitions/advisory.TriageNotes"}},"type":"object"},"advisory.OverrideCVE":{"properties":{"configurations":{"items":{"$ref":"#/definitions/advisory.OverrideConfiguration"},"type":"array"}},"type":"object"},"advisory.OverrideConfiguration":{"properties":{"nodes":{"items":{"$ref":"#/definitions/advisory.CPENode"},"type":"array"}},"type":"object"},"advisory.OwnCloud":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PGFix":{"properties":{"affected":{"type":"string"},"fixed":{"type":"string"}},"type":"object"},"advisory.PHPMyAdmin":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PKCert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTC":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTMDescriptions":{"properties":{"cweId":{"type":"string"},"description":{"type":"string"},"lang":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Package":{"properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.PackageStat":{"properties":{"cpe":{"type":"string"},"fix_state":{"type":"string"},"package_name":{"type":"string"},"product_name":{"type":"string"}},"type":"object"},"advisory.PacketstormExploit":{"properties":{"author":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"download_url":{"type":"string"},"md5":{"type":"string"},"summary":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Palantir":{"properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaloAltoAdvisory":{"properties":{"affected":{"type":"string"},"applicableVersions":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"confidentialityImpact":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvssbaseScore":{"type":"string"},"datePublished":{"type":"string"},"dateUpdated":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"problem":{"type":"string"},"product":{"type":"string"},"scope":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"unaffected":{"type":"string"},"url":{"type":"string"},"userInteraction":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.Panasonic":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaperCut":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Patch":{"properties":{"advisory_id":{"type":"string"},"component":{"type":"string"},"link":{"type":"string"},"os_sw":{"type":"string"}},"type":"object"},"advisory.Pega":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhilipsAdvisory":{"properties":{"affected_products":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhoenixContactAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.PostgresSQL":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"pg_fix":{"items":{"$ref":"#/definitions/advisory.PGFix"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PowerDNS":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PrimeVersion":{"properties":{"jdK":{"type":"string"},"prime":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Product":{"properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/definitions/advisory.IdentificationHelper"}},"type":"object"},"advisory.ProductBranch":{"properties":{"branches":{"items":{"$ref":"#/definitions/advisory.ProductBranch"},"type":"array"},"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/definitions/advisory.Product"},"relationships":{"items":{"$ref":"#/definitions/advisory.CSAFRelationship"},"type":"array"}},"type":"object"},"advisory.ProductSpecificDetail":{"properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.ProductTree":{"properties":{"relationships":{"items":{"$ref":"#/definitions/advisory.Relationship"},"type":"array"}},"type":"object"},"advisory.ProductsAffected":{"properties":{"cve":{"type":"string"},"description":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.Progress":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Proofpoint":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Publisher":{"properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.PureStorage":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PyPAAdvisory":{"properties":{"advisory_id":{"description":"ID is the PYSEC- identifier","type":"string"},"affected":{"description":"Affected will list out the vulnerable versions.","items":{"$ref":"#/definitions/advisory.PyPAAffected"},"type":"array"},"aliases":{"description":"Aliases are other identifiers that refer to this, such as a CVE","items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"description":"Details discuss the vulnerability information","type":"string"},"modified":{"description":"Modified is non-zero Time if entry was updated","type":"string"},"published":{"description":"Published is the datetime when this was released","type":"string"},"references":{"description":"References are links to more detailed advisories, fixes, etc.","items":{"$ref":"#/definitions/advisory.PyPAReference"},"type":"array"},"was_withdrawn":{"description":"WasWD indicates if the advisory was withdrawn or not.","type":"boolean"},"withdrawn":{"description":"Withdrawn is non-zero if this advisory has been withdrawn","type":"string"}},"type":"object"},"advisory.PyPAAffected":{"properties":{"package":{"$ref":"#/definitions/advisory.PyPAPackage"},"ranges":{"items":{"$ref":"#/definitions/advisory.PyPARange"},"type":"array"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.PyPAEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.PyPAPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.PyPARange":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.PyPAEvent"},"type":"array"},"ranges_type":{"type":"string"}},"type":"object"},"advisory.PyPAReference":{"properties":{"refs_type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QNAPAdvisory":{"properties":{"affected":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"last_update_date":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"severity_number":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.QQID":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss3_score":{"type":"string"},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"qid":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QSB":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualcomm":{"properties":{"chipsets":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualys":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"exploits":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QualysQID":{"properties":{"consequence":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_v2":{"items":{"$ref":"#/definitions/advisory.CvsssV2_3"},"type":"array"},"cvss_v3":{"items":{"$ref":"#/definitions/advisory.CvsssV2_3"},"type":"array"},"date_added":{"type":"string"},"date_insert":{"type":"string"},"description":{"type":"string"},"patches":{"items":{"$ref":"#/definitions/advisory.Patch"},"type":"array"},"published":{"type":"string"},"qid":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor_refs":{"items":{"$ref":"#/definitions/advisory.VendorRef"},"type":"array"}},"type":"object"},"advisory.RDescription":{"properties":{"value":{"type":"string"}},"type":"object"},"advisory.RNote":{"properties":{"audience":{"type":"string"},"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"description":"diff between xml \u0026\u0026 json","type":"integer"}},"type":"object"},"advisory.RRevision":{"properties":{"date":{"type":"string"},"description":{"$ref":"#/definitions/advisory.RDescription"},"number":{"type":"string"}},"type":"object"},"advisory.RScoreSet":{"properties":{"base_score":{"type":"string"},"product_id":{"type":"string"},"temporal_score":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.RThreat":{"properties":{"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/definitions/advisory.IVal"},"ProductID":{"items":{"type":"string"},"type":"array"},"Type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.Range":{"properties":{"events":{"items":{"$ref":"#/definitions/advisory.Event"},"type":"array"},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RansomwareExploit":{"properties":{"associated_capecs":{"items":{"$ref":"#/definitions/advisory.Capec"},"type":"array"},"associated_cwes":{"items":{"$ref":"#/definitions/advisory.CweData"},"type":"array"},"associated_mitre_attack_techniques":{"items":{"$ref":"#/definitions/advisory.MitreAttackTechWithRefs"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cve_references":{"items":{"$ref":"#/definitions/advisory.CVEReference"},"type":"array"},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"ransomware_family":{"type":"string"},"tools":{"items":{"$ref":"#/definitions/advisory.Tool"},"type":"array"}},"type":"object"},"advisory.RecordType":{"properties":{"finding":{"type":"string"},"id":{"type":"string"},"kind":{"type":"string"}},"type":"object"},"advisory.RedLion":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RedhatCVE":{"properties":{"advisories":{"items":{"type":"string"},"type":"array"},"advisory_csaf_vex_url":{"items":{"type":"string"},"type":"array"},"affected_packages":{"description":"used for un-marshlling from redhat","items":{"type":"string"},"type":"array"},"affected_release":{"items":{"$ref":"#/definitions/advisory.AffectedRel"},"type":"array"},"bugzilla":{"type":"string"},"bugzilla_description":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cve_csaf_vex_url":{"type":"string"},"cvss3_score":{"type":"string"},"cvss3_scoring_vector":{"type":"string"},"cvss_score":{"type":"number"},"cvss_scoring_vector":{"type":"string"},"cwe":{"type":"string"},"package_state":{"items":{"$ref":"#/definitions/advisory.PackageStat"},"type":"array"},"packages":{"description":"used to index into vulncheck OS","items":{"$ref":"#/definitions/advisory.VulnCheckPackage"},"type":"array"},"public_date":{"type":"string"},"resource_url":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Reference":{"properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RelatedRule":{"properties":{"id":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Relationship":{"properties":{"productReference":{"type":"string"},"relatesToProductReference":{"type":"string"},"relationType":{"type":"string"}},"type":"object"},"advisory.RemediationData":{"properties":{"category":{"type":"string"},"date":{"type":"string"},"details":{"type":"string"},"entitlements":{"items":{"type":"string"},"type":"array"},"group_ids":{"items":{"type":"string"},"type":"array"},"product_ids":{"items":{"type":"string"},"type":"array"},"restart_required":{"$ref":"#/definitions/advisory.RestartData"}},"type":"object"},"advisory.Renesas":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ReportedExploit":{"properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RestartData":{"properties":{"category":{"type":"string"},"details":{"type":"string"}},"type":"object"},"advisory.Revision":{"properties":{"date":{"type":"string"},"description":{"type":"string"},"number":{"type":"string"}},"type":"object"},"advisory.RevisionHistory":{"properties":{"date":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Revive":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RhelCVE":{"properties":{"csaf":{"$ref":"#/definitions/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Roche":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"roche_cves":{"items":{"$ref":"#/definitions/advisory.RocheCVE"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RocheCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.Rockwell":{"properties":{"affected_products":{"items":{"$ref":"#/definitions/advisory.RockwellAffectedProduct"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RockwellAffectedProduct":{"properties":{"affectedCatalogNumber":{"type":"string"},"affectedVersion":{"type":"string"},"correctedVersion":{"type":"string"},"cve":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.RockyAdvisory":{"properties":{"affectedProducts":{"items":{"type":"string"},"type":"array"},"buildReferences":{"items":{"type":"string"},"type":"array"},"cves":{"items":{"$ref":"#/definitions/advisory.RockyCve"},"type":"array"},"description":{"type":"string"},"fixes":{"items":{"$ref":"#/definitions/advisory.RockyFix"},"type":"array"},"name":{"type":"string"},"publishedAt":{"type":"string"},"rebootSuggested":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array"},"rpms":{"$ref":"#/definitions/advisory.RockyRpms"},"severity":{"type":"string"},"shortCode":{"type":"string"},"solution":{"type":"string"},"synopsis":{"type":"string"},"topic":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RockyCve":{"properties":{"cvss3BaseScore":{"type":"string"},"cvss3ScoringVector":{"type":"string"},"cwe":{"type":"string"},"name":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"}},"type":"object"},"advisory.RockyErrata":{"properties":{"advisory":{"$ref":"#/definitions/advisory.RockyAdvisory"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.RockyPackage"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.RockyFix":{"properties":{"description":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"},"ticket":{"type":"string"}},"type":"object"},"advisory.RockyPackage":{"properties":{"distro":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.RockyRpms":{"additionalProperties":{"$ref":"#/definitions/advisory.RockyVersion"},"type":"object"},"advisory.RockyVersion":{"properties":{"nvras":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Rsync":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ruckus":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RustsecAdvisory":{"properties":{"advisory":{"$ref":"#/definitions/advisory.RustsecFrontMatterAdvisory"},"affected":{"$ref":"#/definitions/advisory.RustsecAffected"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"versions":{"$ref":"#/definitions/advisory.RustsecFrontMatterVersions"}},"type":"object"},"advisory.RustsecAffected":{"properties":{"arch":{"items":{"type":"string"},"type":"array"},"functions":{"type":"string"},"os":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.RustsecFrontMatterAdvisory":{"properties":{"aliases":{"description":"Vulnerability aliases, e.g. CVE IDs (optional but recommended)\nRequest a CVE for your RustSec vulns: https://iwantacve.org/","items":{"type":"string"},"type":"array"},"categories":{"description":"Optional: Categories this advisory falls under. Valid categories are:\n\"code-execution\", \"crypto-failure\", \"denial-of-service\", \"file-disclosure\"\n\"format-injection\", \"memory-corruption\", \"memory-exposure\", \"privilege-escalation\"","items":{"type":"string"},"type":"array"},"cvss":{"description":"Optional: a Common Vulnerability Scoring System score. More information\ncan be found on the CVSS website, https://www.first.org/cvss/.","type":"string"},"date":{"description":"Disclosure date of the advisory as an RFC 3339 date (mandatory)","type":"string"},"informational":{"description":"Optional: Indicates the type of informational security advisory\n - \"unsound\" for soundness issues\n - \"unmaintained\" for crates that are no longer maintained\n - \"notice\" for other informational notices","type":"string"},"keywords":{"description":"Freeform keywords which describe this vulnerability, similar to Cargo (optional)","items":{"type":"string"},"type":"array"},"package":{"description":"Name of the affected crate (mandatory)","type":"string"},"references":{"description":"URL to additional helpful references regarding the advisory (optional)","items":{"type":"string"},"type":"array"},"related":{"description":"Related vulnerabilities (optional)\ne.g. CVE for a C library wrapped by a -sys crate)","items":{"type":"string"},"type":"array"},"rustsec_id":{"description":"Identifier for the advisory (mandatory). Will be assigned a \"RUSTSEC-YYYY-NNNN\"\nidentifier e.g. RUSTSEC-2018-0001. Please use \"RUSTSEC-0000-0000\" in PRs.","type":"string"},"url":{"description":"URL to a long-form description of this issue, e.g. a GitHub issue/PR,\na change log entry, or a blogpost announcing the release (optional)","type":"string"},"withdrawn":{"description":"Whether the advisory is withdrawn (optional)","type":"string"}},"type":"object"},"advisory.RustsecFrontMatterVersions":{"properties":{"patched":{"items":{"type":"string"},"type":"array"},"unaffected":{"description":"Versions which were never vulnerable (optional)","items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SAAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"threats":{"type":"string"},"vendor":{"type":"string"},"warningDate":{"type":"string"},"warningNumber":{"type":"string"}},"type":"object"},"advisory.SAP":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SECConsult":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SSASource":{"properties":{"document":{"$ref":"#/definitions/advisory.SiemensDocument"},"product_tree":{"$ref":"#/definitions/advisory.SiemensProductTree"},"vulnerabilities":{"items":{"$ref":"#/definitions/advisory.SiemensVulnerability"},"type":"array"}},"type":"object"},"advisory.SSDAdvisory":{"properties":{"analysis":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"poc":{"description":"contains actual poc code","type":"string"},"published":{"type":"string"},"response_ref":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Safran":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SaintExploit":{"properties":{"bid":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"osvdb":{"type":"string"},"saint_id":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SalesForce":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Samba":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"issues":{"type":"string"},"patches":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Sandisk":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SansDshield":{"properties":{"count":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"firstSeen":{"type":"string"},"lastSeen":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SchneiderCVE":{"properties":{"cve":{"type":"string"},"cvss_score3":{"type":"string"},"cvss_score4":{"type":"string"},"cvss_vector3":{"type":"string"},"cvss_vector4":{"type":"string"}},"type":"object"},"advisory.SchneiderElectricAdvisory":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"pdf_url":{"type":"string"},"schneider_cves":{"items":{"$ref":"#/definitions/advisory.SchneiderCVE"},"type":"array"},"schneider_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Schutzwerk":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ScoreSet":{"properties":{"baseScore":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.SecFix":{"properties":{"arch":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SecurityBulletin":{"properties":{"acknowledgement":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvedetails":{"items":{"$ref":"#/definitions/advisory.CVEDetail"},"type":"array"},"date_added":{"type":"string"},"hardwareUpdates":{"items":{"$ref":"#/definitions/advisory.HardwareUpdate"},"type":"array"},"lastUpdated":{"type":"string"},"link":{"type":"string"},"revisions":{"items":{"$ref":"#/definitions/advisory.NvidiaRevision"},"type":"array"},"severity":{"type":"string"},"softwareUpdates":{"items":{"$ref":"#/definitions/advisory.SoftwareUpdate"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SecurityLab":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.SeebugExploit":{"properties":{"author":{"type":"string"},"category":{"type":"string"},"cnnvd":{"items":{"type":"string"},"type":"array"},"cnvd":{"items":{"type":"string"},"type":"array"},"component":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"find_time":{"type":"string"},"name":{"type":"string"},"ssv_id":{"type":"string"},"submitter":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sel":{"properties":{"acknowledgement":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SentinelOne":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ServiceNow":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SevenZip":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Severity":{"properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.ShadowServerExploitedVulnerability":{"properties":{"cnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"detections_last_1_day":{"type":"integer"},"detections_last_30_days":{"type":"integer"},"detections_last_7_days":{"type":"integer"},"detections_last_90_days":{"type":"integer"},"edb":{"type":"string"},"in_kev":{"type":"boolean"},"is_iot":{"type":"boolean"},"is_ransomware":{"type":"boolean"},"product":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_id":{"type":"string"},"vulnerability_link":{"type":"string"}},"type":"object"},"advisory.Shielder":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sick":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.SiemensAcknowledgments":{"properties":{"names":{"items":{"type":"string"},"type":"array"},"organization":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensAdvisory":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvrf_url":{"type":"string"},"date_added":{"type":"string"},"html_url":{"type":"string"},"id":{"type":"string"},"last_update":{"description":"could potentially kill this in the future as it's a dupe","type":"string"},"pdf_url":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"ssa":{"$ref":"#/definitions/advisory.SSASource"},"tags":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"txt_url":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SiemensBranch":{"properties":{"branches":{"items":{"$ref":"#/definitions/advisory.SiemensSubBranch"},"type":"array"},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensCVSSV3":{"properties":{"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensCWE":{"properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensDistribution":{"properties":{"text":{"type":"string"},"tlp":{"$ref":"#/definitions/advisory.SiemensTLP"}},"type":"object"},"advisory.SiemensDocument":{"properties":{"acknowledgments":{"items":{"$ref":"#/definitions/advisory.SiemensAcknowledgments"},"type":"array"},"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/definitions/advisory.SiemensDistribution"},"notes":{"items":{"$ref":"#/definitions/advisory.SiemensNotes"},"type":"array"},"publisher":{"$ref":"#/definitions/advisory.SiemensPublisher"},"references":{"items":{"$ref":"#/definitions/advisory.SiemensReferences"},"type":"array"},"title":{"type":"string"},"tracking":{"$ref":"#/definitions/advisory.SiemensTracking"}},"type":"object"},"advisory.SiemensEngine":{"properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensGenerator":{"properties":{"engine":{"$ref":"#/definitions/advisory.SiemensEngine"}},"type":"object"},"advisory.SiemensNotes":{"properties":{"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.SiemensProduct":{"properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/definitions/advisory.SiemensProductIdentificationHelper"}},"type":"object"},"advisory.SiemensProductIdentificationHelper":{"properties":{"model_numbers":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SiemensProductStatus":{"properties":{"known_affected":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SiemensProductTree":{"properties":{"branches":{"items":{"$ref":"#/definitions/advisory.SiemensBranch"},"type":"array"}},"type":"object"},"advisory.SiemensPublisher":{"properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.SiemensReferences":{"properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRemediation":{"properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRevisionHistory":{"properties":{"date":{"type":"string"},"legacy_version":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensScore":{"properties":{"cvss_v3":{"$ref":"#/definitions/advisory.SiemensCVSSV3"},"products":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SiemensSubBranch":{"properties":{"branches":{"items":{"$ref":"#/definitions/advisory.SiemensSubSubBranch"},"type":"array"},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensSubSubBranch":{"properties":{"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/definitions/advisory.SiemensProduct"}},"type":"object"},"advisory.SiemensTLP":{"properties":{"label":{"type":"string"}},"type":"object"},"advisory.SiemensTracking":{"properties":{"current_release_date":{"type":"string"},"generator":{"$ref":"#/definitions/advisory.SiemensGenerator"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/definitions/advisory.SiemensRevisionHistory"},"type":"array"},"status":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensVulnerability":{"properties":{"cve":{"type":"string"},"cwe":{"$ref":"#/definitions/advisory.SiemensCWE"},"notes":{"items":{"$ref":"#/definitions/advisory.SiemensNotes"},"type":"array"},"product_status":{"$ref":"#/definitions/advisory.SiemensProductStatus"},"references":{"items":{"$ref":"#/definitions/advisory.SiemensReferences"},"type":"array"},"remediations":{"items":{"$ref":"#/definitions/advisory.SiemensRemediation"},"type":"array"},"scores":{"items":{"$ref":"#/definitions/advisory.SiemensScore"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.SierraWireless":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"swid":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRule":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mitre_attack_techniques":{"items":{"type":"string"},"type":"array"},"sigma_rule":{"$ref":"#/definitions/advisory.SigmaRuleRule"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRuleRule":{"properties":{"author":{"type":"string"},"date":{"type":"string"},"description":{"type":"string"},"detection":{"additionalProperties":true,"type":"object"},"false_positives":{"items":{"type":"string"},"type":"array"},"fields":{"items":{"type":"string"},"type":"array"},"id":{"type":"string"},"level":{"type":"string"},"logsource":{"$ref":"#/definitions/advisory.LogSource"},"modified":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"related":{"items":{"$ref":"#/definitions/advisory.RelatedRule"},"type":"array"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.SingCert":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"}},"type":"object"},"advisory.Sitecore":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"summary_ja":{"type":"string"},"title":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Slackware":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SoftwareUpdate":{"properties":{"affectedVersion":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"operatingSystem":{"type":"string"},"softwareProduct":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.SolarWindsAdvisory":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Solr":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sonatype":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SonicWallAdvisory":{"properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"impact":{"type":"string"},"is_workaround_available":{"type":"boolean"},"last_updated_when":{"type":"string"},"published_when":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vuln_status":{"type":"string"},"vulnerable_products_list":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.SpacelabsHealthcareAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Splunk":{"properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"$ref":"#/definitions/advisory.SplunkProduct"},"type":"array"},"bug_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SplunkProduct":{"properties":{"affected_version":{"type":"string"},"component":{"type":"string"},"fixed_version":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Spring":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Status":{"properties":{"productID":{"items":{"type":"string"},"type":"array"},"type":{"type":"string"}},"type":"object"},"advisory.Stormshield":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.StrykerAdvisory":{"properties":{"affected_components":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sudo":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"fix":{"type":"string"},"impact":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.SuseSecurity":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SwisslogHealthcareAdvisory":{"properties":{"affected_components":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Symfony":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synacktiv":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SyncroSoft":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synology":{"properties":{"affected_products":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"last_updated":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Syss":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TI":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"incident_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TPLink":{"properties":{"bulletin_id":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TWCertAdvisory":{"properties":{"affected_cn":{"type":"string"},"affected_en":{"type":"string"},"credit_cn":{"type":"string"},"credit_en":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description_cn":{"type":"string"},"description_en":{"type":"string"},"link":{"type":"string"},"solution_cn":{"type":"string"},"solution_en":{"type":"string"},"title_cn":{"type":"string"},"title_en":{"type":"string"},"tvnid":{"type":"string"}},"type":"object"},"advisory.Tailscale":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TalosAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"talos_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TeamViewer":{"properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TenableResearchAdvisory":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tencent":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Thales":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TheMissingLink":{"properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ThermoFisher":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Threat":{"properties":{"severity":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.ThreatActorWithExternalObjects":{"properties":{"associated_capecs":{"items":{"$ref":"#/definitions/advisory.Capec"},"type":"array"},"associated_cwes":{"items":{"$ref":"#/definitions/advisory.CweData"},"type":"array"},"associated_mitre_attack_techniques":{"items":{"$ref":"#/definitions/advisory.MitreAttackTechWithRefs"},"type":"array"},"country":{"type":"string"},"cve_references":{"items":{"$ref":"#/definitions/advisory.CVEReference"},"type":"array"},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"misp_id":{"type":"string"},"misp_threat_actor":{"$ref":"#/definitions/advisory.MISPValueNoID"},"mitre_attack_group":{"$ref":"#/definitions/advisory.MITREAttackGroupNoID"},"mitre_group_cti":{"$ref":"#/definitions/advisory.MitreGroupCTI"},"mitre_id":{"type":"string"},"threat_actor_name":{"type":"string"},"tools":{"items":{"$ref":"#/definitions/advisory.Tool"},"type":"array"},"vendor_names_for_threat_actors":{"items":{"$ref":"#/definitions/advisory.VendorNameForThreatActor"},"type":"array"},"vendors_and_products_targeted":{"items":{"$ref":"#/definitions/advisory.VendorProduct"},"type":"array"}},"type":"object"},"advisory.ThreatData":{"properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Tibco":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"overview":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Timeline":{"properties":{"lang":{"type":"string"},"time":{"description":"FIXME: flip to time","type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Tool":{"properties":{"name":{"type":"string"},"references":{"items":{"$ref":"#/definitions/advisory.ToolRef"},"type":"array"}},"type":"object"},"advisory.ToolRef":{"properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tracking":{"properties":{"current_release_date":{"type":"string"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/definitions/advisory.RevisionHistory"},"type":"array"},"status":{"type":"string"},"version":{"description":"should match last 'number' in []RevisionHistory","type":"string"}},"type":"object"},"advisory.TrackingID":{"properties":{"system_name":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.TraneTechnology":{"properties":{"brand":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TrendMicro":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"scores":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TriageNotes":{"properties":{"references":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.Trustwave":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USD":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USOMAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"effect_tr":{"type":"string"},"general_information_tr":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution_tr":{"type":"string"},"title_tr":{"type":"string"},"trid":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ubiquiti":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"links":{"items":{"type":"string"},"type":"array"},"products":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.UbuntuCVE":{"properties":{"affected_packages":{"items":{"$ref":"#/definitions/advisory.AffectedUbuntuPackage"},"type":"array"},"cve":{"description":"Candidate","items":{"type":"string"},"type":"array"},"date_added":{"description":"PublicDate","type":"string"},"reference_urls":{"description":"References","items":{"type":"string"},"type":"array"},"source_url":{"type":"string"},"status":{"description":"active || retired","type":"string"},"ubuntu_url":{"type":"string"},"usn":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.UbuntuPackageReleaseStatus":{"properties":{"affected":{"type":"boolean"},"fixed":{"type":"boolean"},"fixed_version":{"type":"string"},"lts":{"type":"boolean"},"release":{"type":"string"},"release_long":{"type":"string"},"release_version":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.Unify":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Unisoc":{"properties":{"access_vector":{"type":"string"},"affected_chipsets":{"type":"string"},"affected_software":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"rating":{"type":"string"},"score":{"type":"string"},"severity":{"type":"string"},"technology":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Update":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/definitions/advisory.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.Package"},"type":"array"},"references":{"items":{"$ref":"#/definitions/advisory.Reference"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/definitions/advisory.DateTime"}},"type":"object"},"advisory.Updated":{"properties":{"date":{"type":"string"}},"type":"object"},"advisory.V3AcceptanceLevel":{"properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.VCCPEDictionary":{"properties":{"baseCPE":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.VCVulnerableCPEs":{"properties":{"cve":{"type":"string"},"unrolled":{"items":{"type":"string"},"type":"array"}},"type":"object"},"advisory.VDEAdvisory":{"properties":{"csaf_json":{"$ref":"#/definitions/advisory.CSAF"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"type":"string"}},"type":"object"},"advisory.VLC":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VMWareAdvisory":{"properties":{"AdvisoryID":{"type":"string"},"AdvisoryURL":{"type":"string"},"CVSSv3Range":{"type":"string"},"IssueDate":{"type":"string"},"Severity":{"type":"string"},"Synopsis":{"type":"string"},"UpdatedOn":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.VYAIREAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VanDyke":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VapidLabsAdvisory":{"properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"exploit":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"vapidId":{"type":"string"},"vendor":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Veeam":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"details":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VendorNameForThreatActor":{"properties":{"threat_actor_name":{"type":"string"},"url":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.VendorProduct":{"properties":{"product":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.VendorRef":{"properties":{"vendor_ref":{"type":"string"},"vendor_ref_url":{"type":"string"}},"type":"object"},"advisory.Veritas":{"properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Virtuozzo":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VoidSec":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheck":{"properties":{"affecting":{"items":{"type":"string"},"type":"array"},"credit":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"cvss_v3_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckCVEListV5":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/definitions/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckConfig":{"properties":{"config":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"}},"type":"object"},"advisory.VulnCheckKEV":{"properties":{"_timestamp":{"type":"string"},"cisa_date_added":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"cwes":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"product":{"type":"string"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"required_action":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulncheck_reported_exploitation":{"items":{"$ref":"#/definitions/advisory.ReportedExploit"},"type":"array"},"vulncheck_xdb":{"items":{"$ref":"#/definitions/advisory.XDB"},"type":"array"},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.VulnCheckPackage":{"properties":{"arch":{"type":"string"},"distro":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Vulnerability":{"properties":{"cve":{"type":"string"},"cvssscoreSets":{"$ref":"#/definitions/advisory.ScoreSet"},"description":{"type":"string"},"packages":{"description":"vulncheck addition","items":{"$ref":"#/definitions/advisory.VulnCheckPackage"},"type":"array"},"productStatuses":{"items":{"$ref":"#/definitions/advisory.Status"},"type":"array"},"references":{"items":{"$ref":"#/definitions/advisory.CVRFReference"},"type":"array"},"threats":{"items":{"$ref":"#/definitions/advisory.Threat"},"type":"array"}},"type":"object"},"advisory.VulnerableDebianPackage":{"properties":{"associated_cves":{"items":{"$ref":"#/definitions/advisory.DebianCVE"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"package_name":{"type":"string"}},"type":"object"},"advisory.VulnerableProduct":{"properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Vulnrichment":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/definitions/advisory.VulnrichmentCVERef"},"url":{"type":"string"}},"type":"object"},"advisory.VulnrichmentCVERef":{"properties":{"containers":{"$ref":"#/definitions/advisory.VulnrichmentContainers"},"cveMetadata":{"$ref":"#/definitions/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.VulnrichmentContainers":{"properties":{"adp":{"items":{"$ref":"#/definitions/advisory.ADP"},"type":"array"},"cna":{"$ref":"#/definitions/advisory.MCna"}},"type":"object"},"advisory.VulnrichmentContent":{"properties":{"id":{"type":"string"},"options":{"items":{"$ref":"#/definitions/advisory.VulnrichmentOption"},"type":"array"},"role":{"type":"string"},"timestamp":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.VulnrichmentMetric":{"properties":{"other":{"$ref":"#/definitions/advisory.VulnrichmentOther"}},"type":"object"},"advisory.VulnrichmentOption":{"properties":{"Automatable":{"type":"string"},"Exploitation":{"type":"string"},"Technical Impact":{"type":"string"}},"type":"object"},"advisory.VulnrichmentOther":{"properties":{"content":{"$ref":"#/definitions/advisory.VulnrichmentContent"},"type":{"type":"string"}},"type":"object"},"advisory.WRT":{"properties":{"advisory":{"type":"string"},"affectedVersions":{"type":"string"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"mitigations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"requirements":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WatchGuard":{"properties":{"advisory_id":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"resolution":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WhatsApp":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wibu":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wireshark":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WithSecure":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WolfSSL":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Wolfi":{"properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array"},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/definitions/advisory.WolfiPackage"},"type":"array"},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.WolfiPackage":{"properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/definitions/advisory.WolfiSecFix"},"type":"array"}},"type":"object"},"advisory.WolfiSecFix":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"version":{"type":"string"}},"type":"object"},"advisory.Wordfence":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.XDB":{"properties":{"clone_ssh_url":{"type":"string"},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"xdb_id":{"type":"string"},"xdb_url":{"type":"string"}},"type":"object"},"advisory.Xen":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updatedAt":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xerox":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xiaomi":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"internal_id":{"type":"string"},"summary":{"type":"string"},"summary_cn":{"type":"string"},"title":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xylem":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"xsa":{"type":"string"}},"type":"object"},"advisory.Yamaha":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.YokogawaAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cwe":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"ysar_id":{"type":"string"}},"type":"object"},"advisory.Yubico":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZDI":{"properties":{"cves":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"string"},"discoverers":{"items":{"type":"string"},"type":"array"},"filter_ids_dv":{"items":{"type":"string"},"type":"array"},"last_updated_at":{"type":"string"},"products":{"items":{"$ref":"#/definitions/advisory.ZDIProduct"},"type":"array"},"public_advisory":{"type":"string"},"published_date":{"type":"string"},"responses":{"items":{"$ref":"#/definitions/advisory.ZDIResponse"},"type":"array"},"title":{"type":"string"},"zdi_can":{"type":"string"},"zdi_public":{"type":"string"}},"type":"object"},"advisory.ZDIProduct":{"properties":{"name":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/definitions/advisory.ZDIVendor"}},"type":"object"},"advisory.ZDIResponse":{"properties":{"text":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/definitions/advisory.ZDIResponseVendor"}},"type":"object"},"advisory.ZDIResponseVendor":{"properties":{"name":{"type":"string"}},"type":"object"},"advisory.ZDIVendor":{"properties":{"name":{"type":"string"},"uri":{"type":"string"}},"type":"object"},"advisory.Zebra":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZeroDayAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zdi":{"$ref":"#/definitions/advisory.ZDI"}},"type":"object"},"advisory.ZeroScienceAdvisory":{"properties":{"advisoryId":{"type":"string"},"affectedVersions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"poC":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Zimbra":{"properties":{"bugs":{"items":{"type":"integer"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"fix":{"type":"string"},"rating":{"type":"string"},"reporter":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Zoom":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"zsb":{"type":"string"}},"type":"object"},"advisory.Zscaler":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZuluVersion":{"properties":{"jdk":{"type":"string"},"type":{"type":"string"},"zulu":{"type":"string"}},"type":"object"},"advisory.Zuso":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"cvss":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zaid":{"type":"string"}},"type":"object"},"advisory.Zyxel":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.BaseMetricV2":{"properties":{"acInsufInfo":{"type":"boolean"},"cvssV2":{"$ref":"#/definitions/api.CVSSV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"severity":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.BaseMetricV3":{"properties":{"cvssV3":{"$ref":"#/definitions/api.CVSSV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"}},"type":"object"},"api.CPE":{"properties":{"edition":{"type":"string"},"language":{"type":"string"},"other":{"type":"string"},"part":{"type":"string"},"product":{"type":"string"},"sw_edition":{"type":"string"},"target_hw":{"type":"string"},"target_sw":{"type":"string"},"update":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CPEMatch":{"properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"cpe_name":{"items":{"$ref":"#/definitions/api.CPEName"},"type":"array"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"api.CPEName":{"properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"lastModifiedDate":{"type":"string"}},"type":"object"},"api.CVE":{"properties":{"CVE_data_meta":{"$ref":"#/definitions/api.CVEDataMeta"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/definitions/api.Description"},"problemtype":{"$ref":"#/definitions/api.ProblemType"},"references":{"$ref":"#/definitions/api.References"}},"type":"object"},"api.CVEDataMeta":{"properties":{"ASSIGNER":{"type":"string"},"ID":{"type":"string"}},"type":"object"},"api.CVEDataMetaExtended":{"properties":{"ALIAS":{"type":"string"},"ASSIGNER":{"type":"string"},"ID":{"type":"string"},"STATUS":{"type":"string"}},"type":"object"},"api.CVEExtended":{"properties":{"CVE_data_meta":{"$ref":"#/definitions/api.CVEDataMetaExtended"},"categorization":{"$ref":"#/definitions/api.CategorizationExtended"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/definitions/api.Description"},"problemtype":{"$ref":"#/definitions/api.ProblemTypeExtended"},"references":{"$ref":"#/definitions/api.ReferencesExtended"}},"type":"object"},"api.CVSSV2":{"properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CVSSV3":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CWE":{"properties":{"abstraction":{"type":"string"},"description":{"type":"string"},"kev_count":{"type":"integer"},"status":{"type":"string"},"structure":{"type":"string"},"vulncheck_nvd_count":{"type":"integer"},"weakness_id":{"type":"string"},"weakness_name":{"type":"string"},"weighted_score":{"type":"number"}},"type":"object"},"api.CategorizationExtended":{"properties":{"tags":{"items":{"type":"string"},"type":"array"}},"type":"object"},"api.ClientFingerprints":{"properties":{"hassh":{"type":"string"},"ja3":{"type":"string"},"ja4":{"type":"string"}},"type":"object"},"api.Configurations":{"properties":{"CVE_data_version":{"type":"string"},"nodes":{"items":{"$ref":"#/definitions/api.Nodes"},"type":"array"}},"type":"object"},"api.CveItems":{"properties":{"configurations":{"$ref":"#/definitions/api.Configurations"},"cve":{"$ref":"#/definitions/api.CVE"},"impact":{"$ref":"#/definitions/api.Impact"},"lastModifiedDate":{"type":"string"},"publishedDate":{"type":"string"},"vcConfigurations":{"$ref":"#/definitions/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array"}},"type":"object"},"api.CveItemsExtended":{"properties":{"_timestamp":{"type":"string"},"configurations":{"$ref":"#/definitions/api.Configurations"},"cve":{"$ref":"#/definitions/api.CVEExtended"},"date_added":{"type":"string"},"documentGenerationDate":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"impact":{"$ref":"#/definitions/api.ImpactExtended"},"lastModifiedDate":{"type":"string"},"mitre_attack_techniques":{"items":{"$ref":"#/definitions/api.MitreAttackTech"},"type":"array"},"publishedDate":{"type":"string"},"related_attack_patterns":{"items":{"$ref":"#/definitions/api.RelatedAttackPattern"},"type":"array"},"vcConfigurations":{"$ref":"#/definitions/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array"},"vulnerable_cpes":{"items":{"type":"string"},"type":"array"}},"type":"object"},"api.DateTime":{"properties":{"date":{"type":"string"}},"type":"object"},"api.Description":{"properties":{"description_data":{"items":{"$ref":"#/definitions/api.DescriptionData"},"type":"array"}},"type":"object"},"api.DescriptionData":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.EPSS":{"properties":{"epss_percentile":{"type":"number"},"epss_score":{"type":"number"},"last_modified":{"type":"string"}},"type":"object"},"api.EPSSData":{"properties":{"_timestamp":{"type":"string"},"cve":{"type":"string"},"epss_percentile":{"type":"number"},"epss_score":{"type":"number"}},"type":"object"},"api.ExploitChain":{"properties":{"cves":{"items":{"$ref":"#/definitions/api.ExploitChainCVE"},"type":"array"},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.ExploitChainCVE":{"properties":{"cve":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ExploitV3Result":{"properties":{"_timestamp":{"description":"ignore this field when checking for differences/changes","type":"string"},"commercial_exploit_found":{"type":"boolean"},"counts":{"$ref":"#/definitions/api.ExploitsV3Count"},"date_added":{"type":"string"},"epss":{"allOf":[{"$ref":"#/definitions/api.EPSS"}],"description":"exclude EPSS from changelog"},"exploits":{"items":{"$ref":"#/definitions/api.NormalizedExploitV3Entry"},"type":"array"},"id":{"type":"string"},"inKEV":{"type":"boolean"},"inVCKEV":{"type":"boolean"},"max_exploit_maturity":{"type":"string"},"public_exploit_found":{"type":"boolean"},"reported_exploitation":{"items":{"$ref":"#/definitions/api.NormalizedReportV3Entry"},"type":"array"},"reported_exploited":{"type":"boolean"},"reported_exploited_by_botnets":{"type":"boolean"},"reported_exploited_by_honeypot_service":{"type":"boolean"},"reported_exploited_by_ransomware":{"type":"boolean"},"reported_exploited_by_threat_actors":{"type":"boolean"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"timeline":{"$ref":"#/definitions/api.ExploitsV3Timeline"},"trending":{"$ref":"#/definitions/api.ExploitsTrending"},"weaponized_exploit_found":{"type":"boolean"}},"type":"object"},"api.ExploitsChange":{"properties":{"change_time":{"type":"string"},"change_type":{"type":"string"},"field":{"type":"string"},"new_value":{},"old_value":{}},"type":"object"},"api.ExploitsChangelog":{"properties":{"changes":{"items":{"$ref":"#/definitions/api.ExploitsChange"},"type":"array"},"cve":{"type":"string"}},"type":"object"},"api.ExploitsTrending":{"properties":{"github":{"type":"boolean"}},"type":"object"},"api.ExploitsV3Count":{"properties":{"botnets":{"type":"integer"},"exploits":{"type":"integer"},"ransomware_families":{"type":"integer"},"threat_actors":{"type":"integer"}},"type":"object"},"api.ExploitsV3Timeline":{"properties":{"cisa_kev_date_added":{"type":"string"},"cisa_kev_date_due":{"type":"string"},"first_exploit_published":{"type":"string"},"first_exploit_published_weaponized_or_higher":{"type":"string"},"first_reported_botnet":{"type":"string"},"first_reported_ransomware":{"type":"string"},"first_reported_threat_actor":{"type":"string"},"most_recent_exploit_published":{"type":"string"},"most_recent_reported_botnet":{"type":"string"},"most_recent_reported_ransomware":{"type":"string"},"most_recent_reported_threat_actor":{"type":"string"},"nvd_last_modified":{"description":"it's often the case the nvd record was updated, but in a way that is irrelevant to the contents\nof a vc exploits record.","type":"string"},"nvd_published":{"type":"string"},"vulncheck_kev_date_added":{"type":"string"},"vulncheck_kev_date_due":{"type":"string"}},"type":"object"},"api.HTTPDetails":{"properties":{"http_request_body":{"type":"string"},"http_user_agent":{"type":"string"},"method":{"type":"string"},"protocol":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.Impact":{"properties":{"baseMetricV2":{"$ref":"#/definitions/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/definitions/api.BaseMetricV3"},"metricV40":{"allOf":[{"$ref":"#/definitions/advisory.CVSSV40"}],"description":"this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics"}},"type":"object"},"api.ImpactExtended":{"properties":{"baseMetricV2":{"$ref":"#/definitions/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/definitions/api.BaseMetricV3"},"correctedBaseMetricV3":{"$ref":"#/definitions/api.BaseMetricV3"},"epss":{"$ref":"#/definitions/api.EPSS"},"metricV40":{"$ref":"#/definitions/advisory.CVSSV40"},"ssvc":{"items":{"$ref":"#/definitions/api.SSVC"},"type":"array"},"temporalMetricV2":{"$ref":"#/definitions/api.TemporalMetricV2"},"temporalMetricV3":{"$ref":"#/definitions/api.TemporalMetricV3"},"temporalV3Corrected":{"$ref":"#/definitions/api.TemporalMetricV3"},"threatMetricV40":{"$ref":"#/definitions/advisory.CVSSV40Threat"}},"type":"object"},"api.InitialAccess":{"properties":{"artifacts":{"description":"Artifacts holds the set of available artifacts for this vulnerability, such as exploit, shodan queries, PCAP traces, and others.","items":{"$ref":"#/definitions/api.InitialAccessArtifact"},"type":"array"},"cve":{"description":"CVE identifier for the given initial access record.","type":"string"},"inKEV":{"description":"InKEV is true if this artifact is in CISA's Known Exploited Vulnerabilities (KEV) data set; otherwise, false.","type":"boolean"},"inVCKEV":{"description":"InVCKEV is true if this artifact is in VulnCheck's Known Exploited Vulnerabilities (VCKEV) data set; otherwise, false.","type":"boolean"},"vulnerable_cpes":{"description":"VulnerableCPEs is the list of vulnerable CPE strings associated with this CVE and artifact(s).","items":{"type":"string"},"type":"array"}},"type":"object"},"api.InitialAccessArtifact":{"properties":{"artifactName":{"description":"ArtifactName is a title to associate with this artifact.","type":"string"},"artifactsURL":{"description":"ArtifactsURL are URLs to the available artifact.","items":{"type":"string"},"type":"array"},"baiduQueries":{"description":"...","items":{"type":"string"},"type":"array"},"baiduRawQueries":{"description":"...","items":{"type":"string"},"type":"array"},"censysLegacyQueries":{"description":"CensysLegacyQueries are legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array"},"censysLegacyRawQueries":{"description":"CensysLegacyRawQueries are raw legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array"},"censysQueries":{"description":"CensysQueries are queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array"},"censysRawQueries":{"description":"CensysRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array"},"cloneSSHURL":{"description":"CloneSSHURL is the git URL to clone the artifact with.","type":"string"},"dateAdded":{"description":"DateAdded is when this artifact entry was first added to the InitialAccess data set.","type":"string"},"driftnetQueries":{"description":"DriftnetQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array"},"driftnetRawQueries":{"description":"DriftnetRawQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array"},"exploit":{"description":"Exploit indicates whether or not an exploit is available in this artifact.","type":"boolean"},"fofaQueries":{"description":"FOFAQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with FOFA.","items":{"type":"string"},"type":"array"},"fofaRawQueries":{"items":{"type":"string"},"type":"array"},"googleQueries":{"description":"google queries","items":{"type":"string"},"type":"array"},"googleRawQueries":{"description":"raw google queries","items":{"type":"string"},"type":"array"},"greynoiseQueries":{"description":"GreynoiseQueries are queries for finding the vulnerability via honeypot data.","items":{"type":"string"},"type":"array"},"mitreAttackTechniques":{"description":"MITRE ATT\u0026CK techniques","items":{"type":"string"},"type":"array"},"nmapScript":{"description":"NmapScript indicates whether or not an nmap script for scanning environment exists in this artifact.","type":"boolean"},"pcap":{"description":"PCAP indicates whether of not a package capture of the exploit PoC exploiting a vulnerable system exists in this artifact.","type":"boolean"},"product":{"description":"Product are the software that has the vulnerability.","items":{"type":"string"},"type":"array"},"shodanQueries":{"description":"ShodanQueries are queries for examining potential Internet-exposed devices \u0026 applications with Shodan in URL form.","items":{"type":"string"},"type":"array"},"shodanRawQueries":{"description":"ShodanRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Shodan.","items":{"type":"string"},"type":"array"},"sigmaRule":{"description":"SigmaRule indicates whether or not a Sigma rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"snortRule":{"description":"SnortRule indicates whether or not a Snort rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"suricataRule":{"description":"SuricataRule indicates whether or not a Suricata rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"targetDocker":{"description":"TargetDocker indicates whether or not there is an available docker image with the vulnerability.","type":"boolean"},"targetEncryptedComms":{"description":"Encrypted communications?","type":"string"},"targetService":{"description":"TargetService indicates the service (HTTP, FTP, etc) that this exploit targets.","type":"string"},"vendor":{"description":"Vendor of the vulnerable product","type":"string"},"versionScanner":{"description":"VersionScanner indicates whether or not the exploit PoC can determine if target system is vulnerable without sending exploit payload in this artifact.","type":"boolean"},"yara":{"description":"YARA indicates whether or not a YARA rule designed to detect the exploit on an endpoint exists in this artifact.","type":"boolean"},"zeroday":{"description":"Zeroday indicates whether or not it is a VulnCheck zeroday.","type":"boolean"},"zoomEyeQueries":{"description":"ZoomEyeQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with ZoomEye.","items":{"type":"string"},"type":"array"},"zoomEyeRawQueries":{"items":{"type":"string"},"type":"array"}},"type":"object"},"api.MitreAttackTech":{"properties":{"d3fendmapping":{"items":{"$ref":"#/definitions/api.MitreMitigation2D3fendMapping"},"type":"array"},"detections":{"items":{"$ref":"#/definitions/api.MitreDetectionTech"},"type":"array"},"domain":{"type":"string"},"id":{"type":"string"},"mitigations":{"items":{"$ref":"#/definitions/api.MitreMitigationTech"},"type":"array"},"name":{"type":"string"},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.MitreAttackToCVE":{"properties":{"cve_list":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"technique_id":{"$ref":"#/definitions/api.MitreAttackTech"}},"type":"object"},"api.MitreD3fendTechnique":{"properties":{"id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.MitreDetectionTech":{"properties":{"datacomponent":{"type":"string"},"datasource":{"type":"string"},"detects":{"type":"string"},"id":{"type":"string"}},"type":"object"},"api.MitreMitigation2D3fendMapping":{"properties":{"d3fendtechniques":{"items":{"$ref":"#/definitions/api.MitreD3fendTechnique"},"type":"array"},"id":{"type":"string"}},"type":"object"},"api.MitreMitigationTech":{"properties":{"description":{"type":"string"},"id":{"type":"string"},"mitigation_url":{"type":"string"}},"type":"object"},"api.NVD20CPEMatch":{"properties":{"cpeLastModified":{"type":"string"},"created":{"type":"string"},"criteria":{"type":"string"},"lastModified":{"type":"string"},"matchCriteriaId":{"type":"string"},"matches":{"items":{"$ref":"#/definitions/api.NVD20CPEName"},"type":"array"},"status":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"}},"type":"object"},"api.NVD20CPEName":{"properties":{"cpeName":{"type":"string"},"cpeNameId":{"type":"string"}},"type":"object"},"api.NVD20CVE":{"properties":{"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"descriptions":{"items":{"$ref":"#/definitions/api.NVD20Description"},"type":"array"},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/definitions/api.NVD20Metric"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/api.NVD20Reference"},"type":"array"},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array"},"vendorComments":{"items":{"$ref":"#/definitions/api.NVD20VendorComment"},"type":"array"},"vulnStatus":{"type":"string"},"weaknesses":{"items":{"$ref":"#/definitions/api.NVD20Weakness"},"type":"array"}},"type":"object"},"api.NVD20CVEExtended":{"properties":{"ALIAS":{"type":"string"},"STATUS":{"type":"string"},"_timestamp":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"categorization":{"$ref":"#/definitions/api.CategorizationExtended"},"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"date_added":{"type":"string"},"descriptions":{"items":{"$ref":"#/definitions/api.NVD20Description"},"type":"array"},"documentGenerationDate":{"type":"string"},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/definitions/api.NVD20MetricExtended"},"mitreAttackTechniques":{"items":{"$ref":"#/definitions/api.MitreAttackTech"},"type":"array"},"published":{"type":"string"},"references":{"items":{"$ref":"#/definitions/api.NVD20ReferenceExtended"},"type":"array"},"relatedAttackPatterns":{"items":{"$ref":"#/definitions/api.RelatedAttackPattern"},"type":"array"},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/definitions/advisory.NVD20Configuration"},"type":"array"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array"},"vendorComments":{"items":{"$ref":"#/definitions/api.NVD20VendorComment"},"type":"array"},"vulnStatus":{"type":"string"},"vulncheckKEVExploitAdd":{"type":"string"},"vulnerableCPEs":{"items":{"type":"string"},"type":"array"},"weaknesses":{"items":{"$ref":"#/definitions/api.NVD20WeaknessExtended"},"type":"array"}},"type":"object"},"api.NVD20CvssDataV2":{"properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssDataV3":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"environmentalSeverity":{"type":"string"},"exploitCodeMaturity":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedAvailabilityImpact":{"type":"string"},"modifiedConfidentialityImpact":{"type":"string"},"modifiedIntegrityImpact":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedScope":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"privilegesRequired":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"scope":{"type":"string"},"temporalScore":{"type":"number"},"temporalSeverity":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV2":{"properties":{"acInsufInfo":{"type":"boolean"},"baseSeverity":{"type":"string"},"cvssData":{"$ref":"#/definitions/api.NVD20CvssDataV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"source":{"type":"string"},"type":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.NVD20CvssMetricV3":{"properties":{"cvssData":{"$ref":"#/definitions/api.NVD20CvssDataV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV40":{"properties":{"cvssData":{"$ref":"#/definitions/advisory.CVSSV40"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20Description":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20Metric":{"properties":{"cvssMetricV2":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV2"},"type":"array"},"cvssMetricV30":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV3"},"type":"array"},"cvssMetricV31":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV3"},"type":"array"},"cvssMetricV40":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV40"},"type":"array"}},"type":"object"},"api.NVD20MetricExtended":{"properties":{"cvssMetricV2":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV2"},"type":"array"},"cvssMetricV30":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV3"},"type":"array"},"cvssMetricV31":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV3"},"type":"array"},"cvssMetricV40":{"items":{"$ref":"#/definitions/api.NVD20CvssMetricV40"},"type":"array"},"epss":{"$ref":"#/definitions/api.EPSS"},"ssvc":{"items":{"$ref":"#/definitions/api.SSVC"},"type":"array"},"temporalCVSSV2":{"$ref":"#/definitions/api.NVD20TemporalCVSSV2"},"temporalCVSSV2Secondary":{"items":{"$ref":"#/definitions/api.NVD20TemporalCVSSV2"},"type":"array"},"temporalCVSSV30":{"$ref":"#/definitions/api.NVD20TemporalCVSSV3"},"temporalCVSSV30Secondary":{"items":{"$ref":"#/definitions/api.NVD20TemporalCVSSV3"},"type":"array"},"temporalCVSSV31":{"$ref":"#/definitions/api.NVD20TemporalCVSSV3"},"temporalCVSSV31Secondary":{"items":{"$ref":"#/definitions/api.NVD20TemporalCVSSV3"},"type":"array"},"threatCVSSV40":{"$ref":"#/definitions/api.NVD20ThreatCVSSV40"},"threatCVSSV40Secondary":{"items":{"$ref":"#/definitions/api.NVD20ThreatCVSSV40"},"type":"array"}},"type":"object"},"api.NVD20Reference":{"properties":{"source":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.NVD20ReferenceExtended":{"properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"source":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.NVD20TemporalAssociatedBaseMetric":{"properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV2":{"properties":{"associatedBaseMetricV2":{"$ref":"#/definitions/api.NVD20TemporalAssociatedBaseMetric"},"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV3":{"properties":{"associatedBaseMetricV3":{"$ref":"#/definitions/api.NVD20TemporalAssociatedBaseMetric"},"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20ThreatAssociatedBaseMetric":{"properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20ThreatCVSSV40":{"properties":{"associatedBaseMetricV40":{"$ref":"#/definitions/api.NVD20ThreatAssociatedBaseMetric"},"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"api.NVD20VendorComment":{"properties":{"comment":{"type":"string"},"lastModified":{"type":"string"},"organization":{"type":"string"}},"type":"object"},"api.NVD20Weakness":{"properties":{"description":{"items":{"$ref":"#/definitions/api.NVD20Description"},"type":"array"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20WeaknessDescExtended":{"properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20WeaknessExtended":{"properties":{"description":{"items":{"$ref":"#/definitions/api.NVD20WeaknessDescExtended"},"type":"array"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.Nodes":{"properties":{"children":{"items":{"$ref":"#/definitions/api.Nodes"},"type":"array"},"cpe_match":{"items":{"$ref":"#/definitions/api.CPEMatch"},"type":"array"},"operator":{"type":"string"}},"type":"object"},"api.NormalizedExploitV3Entry":{"properties":{"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"date_added":{"type":"string"},"exploit_availability":{"type":"string"},"exploit_maturity":{"type":"string"},"exploit_type":{"type":"string"},"name":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.NormalizedReportV3Entry":{"properties":{"date_added":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackage":{"properties":{"artifacts":{"$ref":"#/definitions/api.OSSPackageArtifacts"},"cves":{"items":{"type":"string"},"type":"array"},"licenses":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array"},"research_attributes":{"$ref":"#/definitions/api.OSSPackageResearchAttributes"},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/definitions/api.OSSPackageVulnerability"},"type":"array"}},"type":"object"},"api.OSSPackageArtifacts":{"properties":{"binary":{"items":{"$ref":"#/definitions/api.OSSPackageDownloadInfo"},"type":"array"},"source":{"items":{"$ref":"#/definitions/api.OSSPackageDownloadInfo"},"type":"array"}},"type":"object"},"api.OSSPackageDownloadInfo":{"properties":{"hashes":{"items":{"$ref":"#/definitions/api.OSSPackageHashInfo"},"type":"array"},"reference":{"type":"string"},"type":{"description":"See OSSPackageDownloadInfoType* consts","type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackageHashInfo":{"properties":{"algorithm":{"description":"See OSSPackageHashInfoAlgo* consts","type":"string"},"type":{"description":"See OSSPackageHashInfoType* consts","type":"string"},"value":{"description":"hex string digest or link to hash","type":"string"}},"type":"object"},"api.OSSPackageResearchAttributes":{"properties":{"abandoned":{"type":"boolean"},"eol":{"type":"boolean"},"is_malicious":{"type":"boolean"},"malicious_source":{"type":"string"},"repo_hijackable":{"type":"boolean"},"squatted_package":{"type":"string"}},"type":"object"},"api.OSSPackageVulnerability":{"properties":{"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"api.Package":{"properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.ProblemType":{"properties":{"problemtype_data":{"items":{"$ref":"#/definitions/api.ProblemTypeData"},"type":"array"}},"type":"object"},"api.ProblemTypeData":{"properties":{"description":{"items":{"$ref":"#/definitions/api.ProblemTypeDescription"},"type":"array"}},"type":"object"},"api.ProblemTypeDataExtended":{"properties":{"description":{"items":{"$ref":"#/definitions/api.ProblemTypeDescriptionExtended"},"type":"array"}},"type":"object"},"api.ProblemTypeDescription":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeDescriptionExtended":{"properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeExtended":{"properties":{"problemtype_data":{"items":{"$ref":"#/definitions/api.ProblemTypeDataExtended"},"type":"array"}},"type":"object"},"api.Reference":{"properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ReferenceData":{"properties":{"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.ReferenceDataExtended":{"properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array"},"url":{"type":"string"}},"type":"object"},"api.References":{"properties":{"reference_data":{"items":{"$ref":"#/definitions/api.ReferenceData"},"type":"array"}},"type":"object"},"api.ReferencesExtended":{"properties":{"reference_data":{"description":"ExploitData []NormalizedExploit `json:\"exploit_data,omitempty\"`\n\t\tThreatActorData []ThreatActorExtended `json:\"threat_actor_data,omitempty\"`\n\t\tRansomwareData []RansomwareReferenceData `json:\"ransomware_data,omitempty\"`\n\t\tAdvisoryData []AdvisoryExtended `json:\"advisory_data,omitempty\"`\n\t\tIdentifierData []IdentifierExtended `json:\"identifier_data,omitempty\"`","items":{"$ref":"#/definitions/api.ReferenceDataExtended"},"type":"array"}},"type":"object"},"api.RelatedAttackPattern":{"properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"api.SSVC":{"properties":{"automatable":{"type":"string"},"exploitation":{"type":"string"},"source":{"type":"string"},"technicalImpact":{"type":"string"}},"type":"object"},"api.TemporalCVSSV2":{"properties":{"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalCVSSV3":{"properties":{"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalMetricV2":{"properties":{"cvssV2":{"$ref":"#/definitions/api.TemporalCVSSV2"}},"type":"object"},"api.TemporalMetricV3":{"properties":{"cvssV3":{"$ref":"#/definitions/api.TemporalCVSSV3"}},"type":"object"},"api.Update":{"properties":{"cve":{"items":{"type":"string"},"type":"array"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/definitions/api.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/definitions/api.Package"},"type":"array"},"references":{"items":{"$ref":"#/definitions/api.Reference"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/definitions/api.DateTime"}},"type":"object"},"api.VulnCheckCanary":{"properties":{"category":{"type":"string"},"client_fingerprints":{"$ref":"#/definitions/api.ClientFingerprints"},"cve":{"type":"string"},"dst_country":{"type":"string"},"http":{"$ref":"#/definitions/api.HTTPDetails"},"payload":{"type":"string"},"severity":{"type":"integer"},"signature":{"type":"string"},"signature_id":{"type":"integer"},"src_country":{"type":"string"},"src_ip":{"type":"string"},"src_port":{"type":"integer"},"timestamp":{"type":"string"}},"type":"object"},"api.VulnerabilityAlias":{"properties":{"alias":{"type":"string"},"cve":{"type":"string"},"reference_url":{"type":"string"}},"type":"object"},"models.Entitlements":{"properties":{"entitlements":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Entitlements provides a map of roles to a list of entitlements","type":"object"}},"type":"object"},"paginate.Match":{"properties":{"field":{"type":"string"},"value":{"type":"string"}},"type":"object"},"paginate.Pagination":{"properties":{"cursor":{"description":"Cursor for the current page","type":"string"},"first_item":{"description":"First and last Item","type":"integer"},"index":{"description":"The requested index","type":"string"},"last_item":{"type":"integer"},"limit":{"description":"Per-Page limit","type":"integer"},"matches":{"items":{"$ref":"#/definitions/paginate.Match"},"type":"array"},"max_pages":{"type":"integer"},"next_cursor":{"description":"Cursor for the next page","type":"string"},"opensearch_query":{"type":"object"},"order":{"type":"string"},"page":{"description":"The current Page number","type":"integer"},"pages":{"items":{"type":"string"},"type":"array"},"parameters":{"items":{"$ref":"#/definitions/paginate.Param"},"type":"array"},"show_pages":{"type":"boolean"},"show_query":{"type":"boolean"},"sort":{"type":"string"},"timestamp":{"type":"string"},"total_documents":{"description":"The total number of items","type":"integer"},"total_pages":{"description":"The total number of pages","type":"integer"},"warnings":{"items":{"type":"string"},"type":"array"}},"type":"object"},"paginate.Param":{"properties":{"filtering":{"type":"string"},"format":{"type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexBackup":{"properties":{"date_added":{"type":"string"},"filename":{"type":"string"},"sha256":{"type":"string"},"url":{"type":"string"},"url_ap-southeast-2":{"type":"string"},"url_eu-west-2":{"type":"string"},"url_expires":{"type":"string"},"url_il-central-1":{"type":"string"},"url_me-central-1":{"type":"string"},"url_mrap":{"type":"string"},"url_ttl_minutes":{"type":"integer"},"url_us-east-1":{"type":"string"},"url_us-west-2":{"type":"string"}},"type":"object"},"params.IndexBackupList":{"properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed backup information","type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexList":{"properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed index information","type":"string"},"name":{"type":"string"}},"type":"object"},"purl.BatchVulnFinding":{"properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array"},"purl":{"description":"the purl, ex. hex/coherence@0.1.2","type":"string"},"purl_struct":{"allOf":[{"$ref":"#/definitions/purl.PackageURLJSON"}],"description":"meta-data about the purl"},"research_attributes":{"$ref":"#/definitions/api.OSSPackageResearchAttributes"},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/definitions/api.OSSPackageVulnerability"},"type":"array"}},"type":"object"},"purl.PackageURLJSON":{"properties":{"name":{"type":"string"},"namespace":{"type":"string"},"qualifiers":{"items":{"$ref":"#/definitions/purl.QualifierJSON"},"type":"array"},"subpath":{"type":"string"},"type":{"type":"string"},"version":{"type":"string"}},"type":"object"},"purl.QualifierJSON":{"properties":{"key":{"type":"string"},"value":{"type":"string"}},"type":"object"},"purls.Artifact":{"type":"object"},"purls.PurlResponse":{"properties":{"artifacts":{"$ref":"#/definitions/purls.Artifact"},"cves":{"items":{"type":"string"},"type":"array"},"licenses":{"items":{"type":"string"},"type":"array"},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array"},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/definitions/purls.Vulnerability"},"type":"array"}},"type":"object"},"purls.Vulnerability":{"properties":{"arch":{"type":"string"},"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"render.Response-array_params_IndexBackupList":{"properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/definitions/params.IndexBackupList"},"type":"array"}},"type":"object"},"render.Response-array_params_IndexList":{"properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/definitions/params.IndexList"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.A10"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ABBAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AIX"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AMD"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AMI"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ASRG"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AVEVAAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AVIDMLAdvs"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AWS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Abbott"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Absolute"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Acronis"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AdobeAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Advantech"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Advisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AdvisoryRecord"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AlephResearch"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Alibaba"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AlmaLinuxUpdate"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AlpineLinuxSecDB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AmazonCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AnchoreNVDOverride"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AndroidAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheActiveMQ"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheArchiva"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheArrow"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheCamel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheCommons"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheCouchDB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheFlink"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheGuacamole"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheHTTP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheHadoop"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheJSPWiki"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheKafka"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheLoggingServices"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheNiFi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheOFBiz"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheOpenMeetings"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheOpenOffice"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApachePulsar"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheShiro"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheSpark"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheStruts"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheSubversion"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheSuperset"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheTomcat"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ApacheZooKeeper"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AppCheck"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Appgate"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AppleAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ArchIssue"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Arista"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Aruba"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AssetNote"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Asterisk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Astra"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Asus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AtlassianAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AtlassianVuln"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Atredis"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Audiocodes"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.AusCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Autodesk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Avaya"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Avigilon"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Axis"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Azul"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BBraunAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BDUAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BLS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Bandr"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BaxterAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BeckhoffAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BeckmanCoulter"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BectonDickinsonAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BeldenAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BeyondTrust"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Binarly"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BitDefender"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BlackBerry"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BoschAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.BostonScientificAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Botnet"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CACyberCentreAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CBLMariner"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CERTEUAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CESA"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CISAAlert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CNNVDEntryJSON"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CNVDBulletin"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CNVDFlaw"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CanvasExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CarestreamAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Carrier"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertBE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertFRAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertIN"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertIRSecurityAlert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertSE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CertUA"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ChainGuard"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CheckPoint"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Chrome"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Ciena"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CisaCsafAdv"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CiscoAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CiscoCSAF"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CiscoKnownGoodValue"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CitrixAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ClarotyVulnerability"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CloudBees"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CloudVulnDBAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CodesysAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CommVault"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CompassSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ContainerOS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CoreImpactExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Crestron"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.CrowdSec"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Curl"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Cvrf"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DFNCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DLink"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DNN"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Dahua"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Danfoss"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Dassault"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DebianSecurityAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Dell"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DeltaAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DistroPackage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Django"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DotCMS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.DragosAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Draytek"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Drupal"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EOLAlibaba"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EOLMicrosoft"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EOLReleaseData"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EUVD"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EatonAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Elastic"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Elspec"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EmergingThreatsSnort"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EmersonAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.EndOfLife"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Endress"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ExodusIntel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ExploitDBExploitv2"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.F5"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FSecure"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Fanuc"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Fastly"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Festo"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FileCloud"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FileZilla"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FlattSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ForgeRock"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FortinetAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.FortinetIPS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Foxit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Fresenius"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GCP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GEGas"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GEHealthcareAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GHAdvisoryJSONLean"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GHSA"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GMOCyberSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Gallagher"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Gen"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Genetec"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Gigabyte"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GitHubExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GitLabExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GiteeExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GitlabAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Glibc"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GnuTLS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GoVulnJSON"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Grafana"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.GreyNoiseDetection"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HCL"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HIKVision"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HKCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HMS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HPE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Hacktivity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HarmonyOS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HashiCorp"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HaskellSADBAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HillromAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Hitachi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HitachiEnergy"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Honeywell"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Huawei"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HuaweiEulerOS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.HuaweiIPS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IAVA"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IBM"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ITWExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Idemia"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Igel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IncibeAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Intel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IpIntelRecord"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IsraeliAlert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IsraeliVulnerability"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Istio"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Ivanti"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.IvantiRSS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JFrog"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JNJAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JVN"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JVNAdvisoryItem"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Jenkins"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JetBrains"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.JohnsonControls"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Juniper"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.K8S"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.KEVCatalogVulnerability"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.KRCertAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.KasperskyICSCERTAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.KoreLogic"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Kunbus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.LG"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Lantronix"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Lenovo"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.LexmarkAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.LibreOffice"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Linux"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.LolAdvs"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MACert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MFiles"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MaliciousPackage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ManageEngineAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MbedTLS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.McAfee"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mediatek"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MedtronicAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mendix"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MetaAdvisories"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MetaData"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MetasploitExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MicrosoftCSAF"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MicrosoftCVRF"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MicrosoftDriverBlockList"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MicrosoftKb"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mikrotik"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mindray"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MispValue"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Mitel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MitreCVEListV5"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MitsubishiElectricAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MongoDB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MoxaAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.MozillaAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NCSC"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NCSCCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NEC"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NHS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NI"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NTP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NVD20Source"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NVDCPEDictionary"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NZAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Naver"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nessus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NetApp"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Netatalk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Netgate"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Netgear"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Netskope"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nexpose"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NginxAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NodeJS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NodeSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nokia"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.NotePadPlusPlus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nozomi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Nuclei"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OSV"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OTRS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OctopusDeploy"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Okta"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Omron"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OneE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenBSD"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenCVDB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenJDK"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenSSH"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenSSLSecAdv"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OpenStack"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Opengear"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OracleCPU"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OracleCPUCSAF"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.OwnCloud"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PHPMyAdmin"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PKCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PTC"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PacketstormExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Palantir"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PaloAltoAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Panasonic"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PaperCut"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Pega"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PhilipsAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PhoenixContactAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PostgresSQL"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PowerDNS"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Progress"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Proofpoint"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PureStorage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.PyPAAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.QNAPAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.QQID"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.QSB"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Qualcomm"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Qualys"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.QualysQID"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RansomwareExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RedLion"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RedhatCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Renesas"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Revive"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RhelCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Roche"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Rockwell"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RockyErrata"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Rsync"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Ruckus"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.RustsecAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SAAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SAP"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SECConsult"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SSDAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Safran"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SaintExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SalesForce"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Samba"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sandisk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SansDshield"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SchneiderElectricAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Schutzwerk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SecurityBulletin"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SecurityLab"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SeebugExploit"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SentinelOne"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ServiceNow"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SevenZip"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ShadowServerExploitedVulnerability"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Shielder"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sick"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SiemensAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SierraWireless"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SigmaRule"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SingCert"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sitecore"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Slackware"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SolarWindsAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Solr"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sonatype"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SonicWallAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SpacelabsHealthcareAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Splunk"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Spring"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Stormshield"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.StrykerAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Sudo"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SuseSecurity"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SwisslogHealthcareAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Symfony"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Synacktiv"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.SyncroSoft"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Synology"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Syss"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TI"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TPLink"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TWCertAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Tailscale"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TalosAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TeamViewer"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TenableResearchAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Tencent"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Thales"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TheMissingLink"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ThermoFisher"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ThreatActorWithExternalObjects"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Tibco"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TraneTechnology"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.TrendMicro"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Trustwave"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.USD"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.USOMAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Ubiquiti"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.UbuntuCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Unify"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Unisoc"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Update"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VCCPEDictionary"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VCVulnerableCPEs"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VDEAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VLC"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VMWareAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VYAIREAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VanDyke"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VapidLabsAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Veeam"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Veritas"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Virtuozzo"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VoidSec"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnCheck"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnCheckCVEListV5"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnCheckConfig"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnCheckKEV"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.VulnerableDebianPackage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Vulnrichment"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WRT"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WatchGuard"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WhatsApp"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Wibu"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Wireshark"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WithSecure"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.WolfSSL"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Wolfi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Wordfence"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Xen"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Xerox"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Xiaomi"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Xylem"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Yamaha"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.YokogawaAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Yubico"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zebra"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ZeroDayAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.ZeroScienceAdvisory"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zimbra"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zoom"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zscaler"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zuso"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/advisory.Zyxel"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_CWE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.CWE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.CveItems"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.CveItemsExtended"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.EPSSData"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.ExploitChain"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.ExploitV3Result"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.ExploitsChangelog"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.InitialAccess"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.MitreAttackToCVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.NVD20CPEMatch"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.NVD20CVE"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.NVD20CVEExtended"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.OSSPackage"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_Update-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.Update"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.VulnCheckCanary"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/api.VulnerabilityAlias"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/paginate.Pagination"},"data":{"items":{"$ref":"#/definitions/purls.PurlResponse"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/v3controllers.ResponseMetadata"},"data":{"items":{"type":"string"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/v3controllers.BackupResponseMetadata"},"data":{"items":{"$ref":"#/definitions/params.IndexBackup"},"type":"array"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/v3controllers.PurlResponseMetadata"},"data":{"$ref":"#/definitions/v3controllers.PurlResponseData"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/definitions/v3controllers.PurlsResponseMetadata"},"data":{"items":{"$ref":"#/definitions/purl.BatchVulnFinding"},"type":"array"}},"type":"object"},"v3controllers.BackupResponseMetadata":{"properties":{"index":{"type":"string"},"timestamp":{"type":"string"}},"type":"object"},"v3controllers.PurlResponseData":{"properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array"},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/definitions/api.OSSPackageVulnerability"},"type":"array"}},"type":"object"},"v3controllers.PurlResponseMetadata":{"properties":{"purl_struct":{"allOf":[{"$ref":"#/definitions/purl.PackageURLJSON"}],"description":"meta-data about the purl"},"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.PurlsResponseMetadata":{"properties":{"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.ResponseMetadata":{"properties":{"cpe":{"type":"string"},"cpe_struct":{"$ref":"#/definitions/api.CPE"},"timestamp":{"type":"string"},"total_documents":{"type":"integer"}},"type":"object"}},"info":{"contact":{"email":"support@vulncheck.com","name":"VulnCheck API Support"},"description":"Version 3 of the VulnCheck API","termsOfService":"https://vulncheck.com/terms","title":"VulnCheck API","version":"3.0"},"paths":{"/backup":{"get":{"description":"Return a list of indexes with backup and endpoint links that the user has access to","produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.Response-array_params_IndexBackupList"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return a list of indexes with backup and endpoint links","tags":["endpoints"]}},"/backup/{index}":{"get":{"description":"Retrieve a list of VulnCheck backups by index","parameters":[{"description":"Name of an exploit, vulnerability, or advisory index","enum":["7zip","a10","abb","abbott","absolute","acronis","adobe","advantech","advisories","aix","aleph-research","alibaba-advs","alma","alpine","alpine-purls","amazon","amazon-cve","amd","ami","anchore-nvd-override","android","apache-activemq","apache-archiva","apache-arrow","apache-camel","apache-commons","apache-couchdb","apache-flink","apache-guacamole","apache-hadoop","apache-http","apache-jspwiki","apache-kafka","apache-loggingservices","apache-nifi","apache-ofbiz","apache-openmeetings","apache-openoffice","apache-pulsar","apache-shiro","apache-spark","apache-struts","apache-subversion","apache-superset","apache-tomcat","apache-zookeeper","appcheck","appgate","apple","arch","arista","aruba","asrg","assetnote","asterisk","astra","asus","atlassian","atlassian-vulns","atredis","audiocodes","auscert","autodesk","avaya","aveva","avidml-advs","avigilon","aws","axis","azul","bandr","baxter","bbraun","bd","bdu","beckhoff","beckman-coulter","belden","beyond-trust","binarly","bitdefender","blackberry","bls","bosch","boston-scientific","botnets","ca-cyber-centre","canvas","carestream","cargo","carrier","cbl-mariner","centos","cert-be","cert-in","cert-ir-security-alerts","cert-se","cert-ua","certeu","certfr","chainguard","checkpoint","chrome","ciena","cisa-alerts","cisa-csaf","cisa-kev","cisco","cisco-csaf","cisco-known-good-values","cisco-talos","citrix","claroty","cloudbees","cloudvulndb","cnnvd","cnvd-bulletins","cnvd-flaws","cocoapods","codesys","commvault","compass-security","composer","conan","coreimpact","cpe-vulnerable","crestron","crowdsec","curl","cwe","dahua","danfoss","dassault","debian","debian-dsa","debian-packages","debian-purls","dell","delta","dfn-cert","django","dlink","dnn","dotcms","dragos","draytek","drupal","eaton","elastic","elspec","emerging-threats-snort","emerson","endoflife","endress","eol","eol-alibaba","eol-microsoft","epss","euvd","exodus-intel","exploit-chains","exploitdb","exploits","exploits-changelog","f-secure","f5","fanuc","fastly","fedora","festo","filecloud","filezilla","flatt-security","forgerock","fortinet","fortinet-ips","foxit","freebsd","fresenius","gallagher","gcp","ge-gas","ge-healthcare","gem","gen","genetec","ghsa","gigabyte","gitee-exploits","github-exploits","github-security-advisories","gitlab-advisories-community","gitlab-exploits","glibc","gmo-cybersecurity","gnutls","go-vulndb","golang","google-0day-itw","google-container-optimized-os","grafana","greynoise-metadata","hackage","hacktivity","harmonyos","hashicorp","haskell-sadb","hcl","hex","hikvision","hillrom","hitachi","hitachi-energy","hkcert","hms","honeywell","hp","hpe","huawei-euleros","huawei-ips","huawei-psirt","iava","ibm","idemia","igel","il-alerts","il-vulnerabilities","incibe","initial-access","initial-access-git","intel","ipintel-10d","ipintel-30d","ipintel-3d","ipintel-90d","istio","ivanti","ivanti-rss","jenkins","jetbrains","jfrog","jnj","johnson-controls","juniper","jvn","jvndb","kaspersky-ics-cert","korelogic","krcert-security-notices","krcert-vulnerabilities","kubernetes","kunbus","lantronix","lenovo","lexmark","lg","libre-office","linux","lol-advs","m-files","macert","malicious-packages","manageengine","maven","mbed-tls","mcafee","mediatek","medtronic","mendix","meta-advisories","metasploit","microsoft-csaf","microsoft-cvrf","microsoft-driver-block-list","microsoft-kb","mikrotik","mindray","misp-threat-actors","mitel","mitre-attack-cve","mitre-cvelist-v5","mitsubishi-electric","mongodb","moxa","mozilla","naver","ncsc","ncsc-cves","nec","nessus","netapp","netatalk","netgate","netgear","netskope","nexpose","nginx","nhs","ni","nist-nvd","nist-nvd2","nist-nvd2-cpematch","nist-nvd2-sources","node-security","nodejs","nokia","notepadplusplus","nozomi","npm","ntp","nuclei","nuget","nvd-cpe-dictionary","nvidia","nz-advisories","octopus-deploy","okta","omron","one-e","opam","open-cvdb","openbsd","opengear","openjdk","openssh","openssl-secadv","openstack","openwrt","oracle","oracle-cpu","oracle-cpu-csaf","osv","otrs","owncloud","packetstorm","palantir","palo-alto","panasonic","papercut","pega","philips","phoenix-contact","php-my-admin","pkcert","postgressql","powerdns","progress","proofpoint","ptc","pub","pure-storage","pypa-advisories","pypi","qnap","qqids","qualcomm","qualys","qualys-qids","qubes-qsb","ransomware","red-lion","redhat","redhat-cves","renesas","revive","roche","rockwell","rocky","rocky-errata","rocky-purls","rsync","ruckus","rustsec-advisories","sacert","safran","saint","salesforce","samba","sandisk","sans-dshield","sap","schneider-electric","schutzwerk","sec-consult","securitylab","seebug","sel","sentinelone","servicenow","shadowserver-exploited","shielder","sick","siemens","sierra-wireless","sigmahq-sigma-rules","singcert","sitecore","slackware","solarwinds","solr","sonatype","sonicwall","spacelabs-healthcare","splunk","spring","ssd","stormshield","stryker","sudo","suse","suse-security","swift","swisslog-healthcare","symfony","synacktiv","syncrosoft","synology","syss","tailscale","teamviewer","tenable-research-advisories","tencent","thales","themissinglink","thermo-fisher","threat-actors","ti","tibco","tp-link","trane-technology","trendmicro","trustwave","twcert","ubiquiti","ubuntu","ubuntu-purls","unify","unisoc","usd","usom","vandyke","vapidlabs","vc-cpe-dictionary","vde","veeam","veritas","virtuozzo","vlc","vmware","voidsec","vulncheck","vulncheck-canaries","vulncheck-canaries-10d","vulncheck-canaries-30d","vulncheck-canaries-3d","vulncheck-canaries-90d","vulncheck-config","vulncheck-cvelist-v5","vulncheck-kev","vulncheck-nvd","vulncheck-nvd2","vulnerability-aliases","vulnrichment","vyaire","watchguard","whatsapp","wibu","wireshark","with-secure","wolfi","wolfssl","wordfence","xen","xerox","xiaomi","xylem","yamaha","yokogawa","yubico","zdi","zebra","zeroscience","zimbra","zoom","zscaler","zuso","zyxel"],"in":"path","name":"index","required":true,"type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve a list of backups by index","tags":["endpoints"]}},"/cpe":{"get":{"description":"Based on the specified CPE (Common Platform Enumeration) URI string, this endpoint will return a list of vulnerabilities that are related to the package. We support v2.2 and v2.3","parameters":[{"description":"CPE designation to lookup","in":"query","name":"cpe","required":true,"type":"string"},{"description":"Filter by vulnerability status (true/false). Defaults to false if not provided.","in":"query","name":"isVulnerable","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return CVE 's associated with a specific NIST CPE","tags":["endpoints"]}},"/entitlements":{"get":{"description":"Retrieve entitlements for the current user","produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/models.Entitlements"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve user entitlements","tags":["endpoints"]}},"/index":{"get":{"description":"Return a list of available indexes with endpoint links that the user has access to","produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.Response-array_params_IndexList"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return a list of available indexes with endpoint links","tags":["endpoints"]}},"/index/7zip":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the 7zip index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 7Zip Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/7zip?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/7zip?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"7zip\"","tags":["indices"]}},"/index/a10":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the a10 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** A10 Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/a10?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/a10?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"a10\"","tags":["indices"]}},"/index/abb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ABB Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"abb\"","tags":["indices"]}},"/index/abbott":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abbott index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Abbott Product Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abbott?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abbott?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"abbott\"","tags":["indices"]}},"/index/absolute":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the absolute index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Absolute Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/absolute?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/absolute?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"absolute\"","tags":["indices"]}},"/index/acronis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the acronis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Acronis Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/acronis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/acronis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"acronis\"","tags":["indices"]}},"/index/adobe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the adobe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Adobe Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/adobe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/adobe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"adobe\"","tags":["indices"]}},"/index/advantech":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advantech index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Advantech Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advantech?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advantech?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"advantech\"","tags":["indices"]}},"/index/advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"advisories\"","tags":["indices"]}},"/index/aix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AIX Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aix\"","tags":["indices"]}},"/index/aleph-research":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aleph-research index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aleph Research Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aleph-research?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aleph-research?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aleph-research\"","tags":["indices"]}},"/index/alibaba-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alibaba-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alibaba-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alibaba-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alibaba-advs\"","tags":["indices"]}},"/index/alma":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alma index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alma Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alma?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alma?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alma\"","tags":["indices"]}},"/index/alpine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alpine\"","tags":["indices"]}},"/index/alpine-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alpine-purls\"","tags":["indices"]}},"/index/amazon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon Linux Security Center\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"amazon\"","tags":["indices"]}},"/index/amazon-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon-cve?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"amazon-cve\"","tags":["indices"]}},"/index/amd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMD Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"amd\"","tags":["indices"]}},"/index/ami":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ami index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMI Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ami?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ami?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ami\"","tags":["indices"]}},"/index/anchore-nvd-override":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the anchore-nvd-override index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Anchore NVD Data Overrides\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/anchore-nvd-override?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/anchore-nvd-override?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"anchore-nvd-override\"","tags":["indices"]}},"/index/android":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the android index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Android Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/android?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/android?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"android\"","tags":["indices"]}},"/index/apache-activemq":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-activemq index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ActiveMQ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-activemq?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-activemq?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-activemq\"","tags":["indices"]}},"/index/apache-archiva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-archiva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Archiva Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-archiva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-archiva?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-archiva\"","tags":["indices"]}},"/index/apache-arrow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-arrow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Arrow Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-arrow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-arrow?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-arrow\"","tags":["indices"]}},"/index/apache-camel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-camel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Camel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-camel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-camel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-camel\"","tags":["indices"]}},"/index/apache-commons":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-commons index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Commons Known Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-commons?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-commons?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-commons\"","tags":["indices"]}},"/index/apache-couchdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-couchdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache CouchDB Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-couchdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-couchdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-couchdb\"","tags":["indices"]}},"/index/apache-flink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-flink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Flink Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-flink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-flink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-flink\"","tags":["indices"]}},"/index/apache-guacamole":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-guacamole index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Guacamole Security Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-guacamole?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-guacamole?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-guacamole\"","tags":["indices"]}},"/index/apache-hadoop":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-hadoop index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Hadoop CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-hadoop?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-hadoop?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-hadoop\"","tags":["indices"]}},"/index/apache-http":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-http index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache HTTP Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-http?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-http?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-http\"","tags":["indices"]}},"/index/apache-jspwiki":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-jspwiki index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache JSPWiki CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-jspwiki?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-jspwiki?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-jspwiki\"","tags":["indices"]}},"/index/apache-kafka":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-kafka index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Kafka Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-kafka?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-kafka?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-kafka\"","tags":["indices"]}},"/index/apache-loggingservices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-loggingservices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Logging Services Known Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-loggingservices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-loggingservices?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-loggingservices\"","tags":["indices"]}},"/index/apache-nifi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-nifi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache NiFi Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-nifi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-nifi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-nifi\"","tags":["indices"]}},"/index/apache-ofbiz":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-ofbiz index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OFBiz Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-ofbiz?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-ofbiz?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-ofbiz\"","tags":["indices"]}},"/index/apache-openmeetings":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openmeetings index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenMeetings Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openmeetings?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openmeetings?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-openmeetings\"","tags":["indices"]}},"/index/apache-openoffice":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openoffice index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenOffice Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openoffice?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openoffice?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-openoffice\"","tags":["indices"]}},"/index/apache-pulsar":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-pulsar index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Pulsar Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-pulsar?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-pulsar?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-pulsar\"","tags":["indices"]}},"/index/apache-shiro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-shiro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Shiro Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-shiro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-shiro?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-shiro\"","tags":["indices"]}},"/index/apache-spark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-spark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Spark Known Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-spark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-spark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-spark\"","tags":["indices"]}},"/index/apache-struts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-struts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Struts Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-struts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-struts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-struts\"","tags":["indices"]}},"/index/apache-subversion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-subversion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Subversion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-subversion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-subversion?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-subversion\"","tags":["indices"]}},"/index/apache-superset":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-superset index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Superset CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-superset?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-superset?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-superset\"","tags":["indices"]}},"/index/apache-tomcat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-tomcat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Tomcat Security Vunlnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-tomcat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-tomcat?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-tomcat\"","tags":["indices"]}},"/index/apache-zookeeper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-zookeeper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ZooKeeper Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-zookeeper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-zookeeper?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-zookeeper\"","tags":["indices"]}},"/index/appcheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appcheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AppCheck Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appcheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appcheck?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"appcheck\"","tags":["indices"]}},"/index/appgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Appgate SDP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appgate?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"appgate\"","tags":["indices"]}},"/index/apple":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apple index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apple Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apple?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apple?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apple\"","tags":["indices"]}},"/index/arch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arch Linux\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"arch\"","tags":["indices"]}},"/index/arista":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arista index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arista Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arista?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arista?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"arista\"","tags":["indices"]}},"/index/aruba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aruba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aruba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aruba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aruba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aruba\"","tags":["indices"]}},"/index/asrg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asrg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASRG Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asrg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asrg?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"asrg\"","tags":["indices"]}},"/index/assetnote":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the assetnote index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AssetNote Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/assetnote?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/assetnote?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"assetnote\"","tags":["indices"]}},"/index/asterisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asterisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Asterisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asterisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asterisk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"asterisk\"","tags":["indices"]}},"/index/astra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the astra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Astra Linux Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/astra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/astra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"astra\"","tags":["indices"]}},"/index/asus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASUSTek Computer Inc.\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"asus\"","tags":["indices"]}},"/index/atlassian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"atlassian\"","tags":["indices"]}},"/index/atlassian-vulns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian-vulns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian-vulns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian-vulns?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"atlassian-vulns\"","tags":["indices"]}},"/index/atredis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atredis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atredis Partners Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atredis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atredis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"atredis\"","tags":["indices"]}},"/index/audiocodes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the audiocodes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AudioCodes Product Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/audiocodes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/audiocodes?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"audiocodes\"","tags":["indices"]}},"/index/auscert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the auscert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AusCERT Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/auscert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/auscert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"auscert\"","tags":["indices"]}},"/index/autodesk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the autodesk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Autodesk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/autodesk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/autodesk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"autodesk\"","tags":["indices"]}},"/index/avaya":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avaya index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avaya Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avaya?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avaya?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"avaya\"","tags":["indices"]}},"/index/aveva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aveva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AVEVA Group Limited\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aveva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aveva?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aveva\"","tags":["indices"]}},"/index/avidml-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avidml-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AI Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avidml-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avidml-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"avidml-advs\"","tags":["indices"]}},"/index/avigilon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avigilon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avigilon Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avigilon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avigilon?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"avigilon\"","tags":["indices"]}},"/index/aws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AWS Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aws?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aws\"","tags":["indices"]}},"/index/axis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the axis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Axis OS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/axis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/axis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"axis\"","tags":["indices"]}},"/index/azul":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the azul index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Azul Common Vulnerabilities and Exposures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/azul?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/azul?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"azul\"","tags":["indices"]}},"/index/bandr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bandr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B\u0026R Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bandr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bandr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bandr\"","tags":["indices"]}},"/index/baxter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the baxter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Baxter Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/baxter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/baxter?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"baxter\"","tags":["indices"]}},"/index/bbraun":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bbraun index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B. Braun Medical Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bbraun?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bbraun?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bbraun\"","tags":["indices"]}},"/index/bd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Becton Dickinson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bd\"","tags":["indices"]}},"/index/bdu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bdu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BDU Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bdu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bdu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bdu\"","tags":["indices"]}},"/index/beckhoff":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckhoff index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckhoff Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckhoff?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckhoff?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"beckhoff\"","tags":["indices"]}},"/index/beckman-coulter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckman-coulter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckman Coulter Product Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckman-coulter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckman-coulter?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"beckman-coulter\"","tags":["indices"]}},"/index/belden":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the belden index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Belden Security Bulletins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/belden?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/belden?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"belden\"","tags":["indices"]}},"/index/beyond-trust":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beyond-trust index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beyond Trust Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beyond-trust?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beyond-trust?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"beyond-trust\"","tags":["indices"]}},"/index/binarly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the binarly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Binarly Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/binarly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/binarly?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"binarly\"","tags":["indices"]}},"/index/bitdefender":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bitdefender index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bitdefender Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bitdefender?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bitdefender?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bitdefender\"","tags":["indices"]}},"/index/blackberry":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the blackberry index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BlackBerry Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/blackberry?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/blackberry?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"blackberry\"","tags":["indices"]}},"/index/bls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Black Lantern Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bls\"","tags":["indices"]}},"/index/bosch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bosch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bosch Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bosch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bosch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bosch\"","tags":["indices"]}},"/index/boston-scientific":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the boston-scientific index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Boston Scientific Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/boston-scientific?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/boston-scientific?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"boston-scientific\"","tags":["indices"]}},"/index/botnets":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the botnets index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Botnets\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/botnets?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/botnets?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"botnets\"","tags":["indices"]}},"/index/ca-cyber-centre":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ca-cyber-centre index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Canadian Centre for Cyber Security Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ca-cyber-centre?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ca-cyber-centre?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ca-cyber-centre\"","tags":["indices"]}},"/index/canvas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the canvas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CANVAS Exploit Packs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/canvas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/canvas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"canvas\"","tags":["indices"]}},"/index/carestream":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carestream index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carestream Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carestream?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carestream?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"carestream\"","tags":["indices"]}},"/index/cargo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cargo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cargo (Rust) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cargo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cargo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cargo\"","tags":["indices"]}},"/index/carrier":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carrier index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carrier Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carrier?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carrier?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"carrier\"","tags":["indices"]}},"/index/cbl-mariner":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cbl-mariner index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CBL-Mariner Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cbl-mariner?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cbl-mariner?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cbl-mariner\"","tags":["indices"]}},"/index/centos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the centos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CentOS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/centos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/centos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"centos\"","tags":["indices"]}},"/index/cert-be":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-be index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert BE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-be?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-be?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-be\"","tags":["indices"]}},"/index/cert-in":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-in index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT IN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-in?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-in?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-in\"","tags":["indices"]}},"/index/cert-ir-security-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ir-security-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert IR Security Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ir-security-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ir-security-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-ir-security-alerts\"","tags":["indices"]}},"/index/cert-se":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-se index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert SE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-se?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-se?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-se\"","tags":["indices"]}},"/index/cert-ua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert UA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ua?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-ua\"","tags":["indices"]}},"/index/certeu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certeu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT-EU The Computer Emergency Response Team for the EU Institutions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certeu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certeu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"certeu\"","tags":["indices"]}},"/index/certfr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certfr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert FR Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certfr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certfr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"certfr\"","tags":["indices"]}},"/index/chainguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chainguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ChainGuard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chainguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chainguard?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"chainguard\"","tags":["indices"]}},"/index/checkpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the checkpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CheckPoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/checkpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/checkpoint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"checkpoint\"","tags":["indices"]}},"/index/chrome":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chrome index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Google Chrome Release Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chrome?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chrome?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"chrome\"","tags":["indices"]}},"/index/ciena":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ciena index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ciena\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ciena?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ciena?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ciena\"","tags":["indices"]}},"/index/cisa-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisa-alerts\"","tags":["indices"]}},"/index/cisa-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories - CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisa-csaf\"","tags":["indices"]}},"/index/cisa-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA KEV (Known Exploited Vulnerabilities)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-kev?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisa-kev\"","tags":["indices"]}},"/index/cisco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco\"","tags":["indices"]}},"/index/cisco-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco-csaf\"","tags":["indices"]}},"/index/cisco-known-good-values":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-known-good-values index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Known Good Values\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-known-good-values?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-known-good-values?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco-known-good-values\"","tags":["indices"]}},"/index/cisco-talos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-talos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Talos Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-talos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-talos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco-talos\"","tags":["indices"]}},"/index/citrix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the citrix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Citrix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/citrix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/citrix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"citrix\"","tags":["indices"]}},"/index/claroty":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the claroty index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Team 82: The Claroty Research Team\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/claroty?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/claroty?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"claroty\"","tags":["indices"]}},"/index/cloudbees":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudbees index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudBees Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudbees?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudbees?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cloudbees\"","tags":["indices"]}},"/index/cloudvulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudvulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudVulnDB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudvulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudvulndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cloudvulndb\"","tags":["indices"]}},"/index/cnnvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnnvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Chinese National Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnnvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnnvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cnnvd\"","tags":["indices"]}},"/index/cnvd-bulletins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-bulletins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-bulletins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-bulletins?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cnvd-bulletins\"","tags":["indices"]}},"/index/cnvd-flaws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-flaws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Flaws\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-flaws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-flaws?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cnvd-flaws\"","tags":["indices"]}},"/index/cocoapods":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cocoapods index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CocoaPods packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cocoapods?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cocoapods?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cocoapods\"","tags":["indices"]}},"/index/codesys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the codesys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Codesys Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/codesys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/codesys?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"codesys\"","tags":["indices"]}},"/index/commvault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the commvault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Commvault Cloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/commvault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/commvault?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"commvault\"","tags":["indices"]}},"/index/compass-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the compass-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Compass Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/compass-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/compass-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"compass-security\"","tags":["indices"]}},"/index/composer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the composer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PHP Composer packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/composer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/composer?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"composer\"","tags":["indices"]}},"/index/conan":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the conan index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** C/C++ packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/conan?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/conan?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"conan\"","tags":["indices"]}},"/index/coreimpact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the coreimpact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Core Impact\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/coreimpact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/coreimpact?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"coreimpact\"","tags":["indices"]}},"/index/cpe-vulnerable":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cpe-vulnerable index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unrolled VulnCheck CPEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cpe-vulnerable?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cpe-vulnerable?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cpe-vulnerable\"","tags":["indices"]}},"/index/crestron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crestron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Crestron Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crestron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crestron?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"crestron\"","tags":["indices"]}},"/index/crowdsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crowdsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CrowdSec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crowdsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crowdsec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"crowdsec\"","tags":["indices"]}},"/index/curl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the curl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Curl CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/curl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/curl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"curl\"","tags":["indices"]}},"/index/cwe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cwe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Common Weakness Enumeration Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cwe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cwe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_CWE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cwe\"","tags":["indices"]}},"/index/dahua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dahua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dahua Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dahua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dahua?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dahua\"","tags":["indices"]}},"/index/danfoss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the danfoss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Danfoss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/danfoss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/danfoss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"danfoss\"","tags":["indices"]}},"/index/dassault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dassault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dassault Systèmes Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dassault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dassault?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dassault\"","tags":["indices"]}},"/index/debian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian\"","tags":["indices"]}},"/index/debian-dsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-dsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-dsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-dsa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian-dsa\"","tags":["indices"]}},"/index/debian-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-packages?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian-packages\"","tags":["indices"]}},"/index/debian-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian PURLs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian-purls\"","tags":["indices"]}},"/index/dell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dell Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dell\"","tags":["indices"]}},"/index/delta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the delta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Delta Controls Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/delta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/delta?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"delta\"","tags":["indices"]}},"/index/dfn-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dfn-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DFN-CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dfn-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dfn-cert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dfn-cert\"","tags":["indices"]}},"/index/django":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the django index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Django Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/django?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/django?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"django\"","tags":["indices"]}},"/index/dlink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dlink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DLink Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dlink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dlink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dlink\"","tags":["indices"]}},"/index/dnn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dnn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DNN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dnn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dnn?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dnn\"","tags":["indices"]}},"/index/dotcms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dotcms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DotCMS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dotcms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dotcms?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dotcms\"","tags":["indices"]}},"/index/dragos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dragos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dragos Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dragos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dragos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dragos\"","tags":["indices"]}},"/index/draytek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the draytek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DrayTek Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/draytek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/draytek?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"draytek\"","tags":["indices"]}},"/index/drupal":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the drupal index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Drupal Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/drupal?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/drupal?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"drupal\"","tags":["indices"]}},"/index/eaton":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eaton index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Eaton Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eaton?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eaton?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eaton\"","tags":["indices"]}},"/index/elastic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elastic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elastic Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elastic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elastic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"elastic\"","tags":["indices"]}},"/index/elspec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elspec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elspec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elspec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elspec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"elspec\"","tags":["indices"]}},"/index/emerging-threats-snort":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerging-threats-snort index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerging Threats Snort\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerging-threats-snort?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerging-threats-snort?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"emerging-threats-snort\"","tags":["indices"]}},"/index/emerson":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerson index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerson Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerson?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerson?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"emerson\"","tags":["indices"]}},"/index/endoflife":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endoflife index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** End Of Life\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endoflife?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endoflife?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"endoflife\"","tags":["indices"]}},"/index/endress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Endress \u0026 Hauser Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endress?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"endress\"","tags":["indices"]}},"/index/eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck EOL Coverage\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eol\"","tags":["indices"]}},"/index/eol-alibaba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-alibaba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-alibaba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-alibaba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eol-alibaba\"","tags":["indices"]}},"/index/eol-microsoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-microsoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-microsoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-microsoft?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eol-microsoft\"","tags":["indices"]}},"/index/epss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the epss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** EPSS Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/epss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/epss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"epss\"","tags":["indices"]}},"/index/euvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the euvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** European Union Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/euvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/euvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"euvd\"","tags":["indices"]}},"/index/exodus-intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exodus-intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Exodus Intelligence Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exodus-intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exodus-intel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exodus-intel\"","tags":["indices"]}},"/index/exploit-chains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploit-chains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Chains\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploit-chains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploit-chains?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploit-chains\"","tags":["indices"]}},"/index/exploitdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploitdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Exploit Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploitdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploitdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploitdb\"","tags":["indices"]}},"/index/exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Intelligence Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploits\"","tags":["indices"]}},"/index/exploits-changelog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits-changelog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Changelog for VC Exploits Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits-changelog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits-changelog?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploits-changelog\"","tags":["indices"]}},"/index/f-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F-Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f-secure?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"f-secure\"","tags":["indices"]}},"/index/f5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F5 Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"f5\"","tags":["indices"]}},"/index/fanuc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fanuc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fanuc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fanuc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fanuc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fanuc\"","tags":["indices"]}},"/index/fastly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fastly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fastly Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fastly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fastly?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fastly\"","tags":["indices"]}},"/index/fedora":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fedora index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fedora Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fedora?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fedora?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fedora\"","tags":["indices"]}},"/index/festo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the festo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Festo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/festo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/festo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"festo\"","tags":["indices"]}},"/index/filecloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filecloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filecloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filecloud?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"filecloud\"","tags":["indices"]}},"/index/filezilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filezilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileZilla Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filezilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filezilla?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"filezilla\"","tags":["indices"]}},"/index/flatt-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the flatt-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Flatt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/flatt-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/flatt-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"flatt-security\"","tags":["indices"]}},"/index/forgerock":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the forgerock index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ForgeRock Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/forgerock?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/forgerock?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"forgerock\"","tags":["indices"]}},"/index/fortinet":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FortiGuard Fortinet\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fortinet\"","tags":["indices"]}},"/index/fortinet-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fortinet Labs Threat Encyclopedia\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet-ips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fortinet-ips\"","tags":["indices"]}},"/index/foxit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the foxit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Foxit Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/foxit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/foxit?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"foxit\"","tags":["indices"]}},"/index/freebsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the freebsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FreeBSD Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/freebsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/freebsd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"freebsd\"","tags":["indices"]}},"/index/fresenius":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fresenius index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fresenius Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fresenius?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fresenius?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fresenius\"","tags":["indices"]}},"/index/gallagher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gallagher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gallagher Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gallagher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gallagher?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gallagher\"","tags":["indices"]}},"/index/gcp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gcp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GCP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gcp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gcp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gcp\"","tags":["indices"]}},"/index/ge-gas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-gas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Gas Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-gas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-gas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ge-gas\"","tags":["indices"]}},"/index/ge-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Healthcare Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ge-healthcare\"","tags":["indices"]}},"/index/gem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruby (gem) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gem?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gem\"","tags":["indices"]}},"/index/gen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gen Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gen?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gen\"","tags":["indices"]}},"/index/genetec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the genetec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Genetec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/genetec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/genetec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"genetec\"","tags":["indices"]}},"/index/ghsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ghsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GHSA\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ghsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ghsa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ghsa\"","tags":["indices"]}},"/index/gigabyte":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gigabyte index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GIGABYTE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gigabyte?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gigabyte?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gigabyte\"","tags":["indices"]}},"/index/gitee-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitee-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gitee Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitee-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitee-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gitee-exploits\"","tags":["indices"]}},"/index/github-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitHub Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"github-exploits\"","tags":["indices"]}},"/index/github-security-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-security-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Github Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-security-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-security-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"github-security-advisories\"","tags":["indices"]}},"/index/gitlab-advisories-community":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-advisories-community index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Advisory Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-advisories-community?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-advisories-community?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gitlab-advisories-community\"","tags":["indices"]}},"/index/gitlab-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gitlab-exploits\"","tags":["indices"]}},"/index/glibc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the glibc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Glibc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/glibc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/glibc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"glibc\"","tags":["indices"]}},"/index/gmo-cybersecurity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gmo-cybersecurity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GMO Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gmo-cybersecurity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gmo-cybersecurity?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gmo-cybersecurity\"","tags":["indices"]}},"/index/gnutls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gnutls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GnuTLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gnutls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gnutls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gnutls\"","tags":["indices"]}},"/index/go-vulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the go-vulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Go Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/go-vulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/go-vulndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"go-vulndb\"","tags":["indices"]}},"/index/golang":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the golang index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Golang packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/golang?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/golang?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"golang\"","tags":["indices"]}},"/index/google-0day-itw":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-0day-itw index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Project Zero In the Wild Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-0day-itw?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-0day-itw?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"google-0day-itw\"","tags":["indices"]}},"/index/google-container-optimized-os":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-container-optimized-os index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Container OS Release Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-container-optimized-os?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-container-optimized-os?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"google-container-optimized-os\"","tags":["indices"]}},"/index/grafana":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the grafana index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Grafana Labs Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/grafana?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/grafana?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"grafana\"","tags":["indices"]}},"/index/greynoise-metadata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the greynoise-metadata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GreyNoise Metadata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/greynoise-metadata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/greynoise-metadata?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"greynoise-metadata\"","tags":["indices"]}},"/index/hackage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hackage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackage (Haskell) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hackage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hackage?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hackage\"","tags":["indices"]}},"/index/hacktivity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hacktivity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackerone Hacktivity\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hacktivity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hacktivity?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hacktivity\"","tags":["indices"]}},"/index/harmonyos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the harmonyos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HarmonyOS Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/harmonyos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/harmonyos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"harmonyos\"","tags":["indices"]}},"/index/hashicorp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hashicorp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HashiCorp Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hashicorp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hashicorp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hashicorp\"","tags":["indices"]}},"/index/haskell-sadb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the haskell-sadb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Haskell Security Advisory DB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/haskell-sadb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/haskell-sadb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"haskell-sadb\"","tags":["indices"]}},"/index/hcl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hcl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HCLSoftware Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hcl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hcl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hcl\"","tags":["indices"]}},"/index/hex":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hex index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hex (Erlang) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hex?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hex?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hex\"","tags":["indices"]}},"/index/hikvision":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hikvision index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hikvision Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hikvision?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hikvision?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hikvision\"","tags":["indices"]}},"/index/hillrom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hillrom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hillrom Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hillrom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hillrom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hillrom\"","tags":["indices"]}},"/index/hitachi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Software Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hitachi\"","tags":["indices"]}},"/index/hitachi-energy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi-energy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Energy Cybersecurity Advisories and Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi-energy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi-energy?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hitachi-energy\"","tags":["indices"]}},"/index/hkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hong Kong CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hkcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hkcert\"","tags":["indices"]}},"/index/hms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HMS (Hardware Meets Software) Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hms?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hms\"","tags":["indices"]}},"/index/honeywell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the honeywell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Honeywell Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/honeywell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/honeywell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"honeywell\"","tags":["indices"]}},"/index/hp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hp\"","tags":["indices"]}},"/index/hpe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HPE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hpe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hpe\"","tags":["indices"]}},"/index/huawei-euleros":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenEuler Operating System Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-euleros?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"huawei-euleros\"","tags":["indices"]}},"/index/huawei-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei IPS Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-ips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"huawei-ips\"","tags":["indices"]}},"/index/huawei-psirt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-psirt?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"huawei-psirt\"","tags":["indices"]}},"/index/iava":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the iava index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Information Assurance Vulnerability Alerts (IAVA)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/iava?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"iava\"","tags":["indices"]}},"/index/ibm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IBM Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ibm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ibm\"","tags":["indices"]}},"/index/idemia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Idemia Product Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/idemia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"idemia\"","tags":["indices"]}},"/index/igel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the igel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IGEL Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/igel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"igel\"","tags":["indices"]}},"/index/il-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"il-alerts\"","tags":["indices"]}},"/index/il-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il CVE Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"il-vulnerabilities\"","tags":["indices"]}},"/index/incibe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Incibe CERT Early Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/incibe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"incibe\"","tags":["indices"]}},"/index/initial-access":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"initial-access\"","tags":["indices"]}},"/index/initial-access-git":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access-git?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"initial-access-git\"","tags":["indices"]}},"/index/intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Intel® Product Security Center Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/intel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"intel\"","tags":["indices"]}},"/index/ipintel-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-10d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","type":"string"},{"description":"Autonomous system number","in":"query","name":"asn","type":"string"},{"description":"Country name ISO-3166?? format","in":"query","name":"country","type":"string"},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","type":"string"},{"description":"Record type","in":"query","name":"id","type":"string"},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","type":"string"},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","type":"string"},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-10d\"","tags":["indices"]}},"/index/ipintel-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-30d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","type":"string"},{"description":"Autonomous system number","in":"query","name":"asn","type":"string"},{"description":"Country name ISO-3166?? format","in":"query","name":"country","type":"string"},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","type":"string"},{"description":"Record type","in":"query","name":"id","type":"string"},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","type":"string"},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","type":"string"},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-30d\"","tags":["indices"]}},"/index/ipintel-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-3d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","type":"string"},{"description":"Autonomous system number","in":"query","name":"asn","type":"string"},{"description":"Country name ISO-3166?? format","in":"query","name":"country","type":"string"},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","type":"string"},{"description":"Record type","in":"query","name":"id","type":"string"},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","type":"string"},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","type":"string"},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-3d\"","tags":["indices"]}},"/index/ipintel-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-90d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","type":"string"},{"description":"Autonomous system number","in":"query","name":"asn","type":"string"},{"description":"Country name ISO-3166?? format","in":"query","name":"country","type":"string"},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","type":"string"},{"description":"Record type","in":"query","name":"id","type":"string"},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","type":"string"},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","type":"string"},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-90d\"","tags":["indices"]}},"/index/istio":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the istio index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Istio Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/istio?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"istio\"","tags":["indices"]}},"/index/ivanti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ivanti\"","tags":["indices"]}},"/index/ivanti-rss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti-rss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ivanti-rss\"","tags":["indices"]}},"/index/jenkins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Jenkins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jenkins?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jenkins\"","tags":["indices"]}},"/index/jetbrains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JetBrains Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jetbrains?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jetbrains\"","tags":["indices"]}},"/index/jfrog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JFrog Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jfrog?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jfrog\"","tags":["indices"]}},"/index/jnj":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Johnson \u0026 Johnson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jnj?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jnj\"","tags":["indices"]}},"/index/johnson-controls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Advisories - Johnson Controls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/johnson-controls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"johnson-controls\"","tags":["indices"]}},"/index/juniper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Juniper Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/juniper?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"juniper\"","tags":["indices"]}},"/index/jvn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvn?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jvn\"","tags":["indices"]}},"/index/jvndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jvndb\"","tags":["indices"]}},"/index/kaspersky-ics-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kaspersky ICS CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kaspersky-ics-cert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"kaspersky-ics-cert\"","tags":["indices"]}},"/index/korelogic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KoreLogic Vulnerability Research and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/korelogic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"korelogic\"","tags":["indices"]}},"/index/krcert-security-notices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-security-notices?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"krcert-security-notices\"","tags":["indices"]}},"/index/krcert-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"krcert-vulnerabilities\"","tags":["indices"]}},"/index/kubernetes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kubernetes Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kubernetes?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"kubernetes\"","tags":["indices"]}},"/index/kunbus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KunBus Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kunbus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"kunbus\"","tags":["indices"]}},"/index/lantronix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lantronix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lantronix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lantronix\"","tags":["indices"]}},"/index/lenovo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lenovo Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lenovo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lenovo\"","tags":["indices"]}},"/index/lexmark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lexmark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lexmark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lexmark\"","tags":["indices"]}},"/index/lg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** LG Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lg?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lg\"","tags":["indices"]}},"/index/libre-office":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Libre Office Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/libre-office?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"libre-office\"","tags":["indices"]}},"/index/linux":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the linux index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Linux Kernel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/linux?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"linux\"","tags":["indices"]}},"/index/lol-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Living Off the Land Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lol-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lol-advs\"","tags":["indices"]}},"/index/m-files":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** M-Files Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/m-files?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"m-files\"","tags":["indices"]}},"/index/macert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the macert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moroccan CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/macert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"macert\"","tags":["indices"]}},"/index/malicious-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Malicious Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/malicious-packages?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"malicious-packages\"","tags":["indices"]}},"/index/manageengine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ManageEngine Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/manageengine?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"manageengine\"","tags":["indices"]}},"/index/maven":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the maven index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Maven (Java) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/maven?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"maven\"","tags":["indices"]}},"/index/mbed-tls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mbed TLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mbed-tls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mbed-tls\"","tags":["indices"]}},"/index/mcafee":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** McAfee Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mcafee?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mcafee\"","tags":["indices"]}},"/index/mediatek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MediaTek Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mediatek?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mediatek\"","tags":["indices"]}},"/index/medtronic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Medtronic Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/medtronic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"medtronic\"","tags":["indices"]}},"/index/mendix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mendix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mendix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mendix\"","tags":["indices"]}},"/index/meta-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Meta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/meta-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"meta-advisories\"","tags":["indices"]}},"/index/metasploit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Metasploit Modules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/metasploit?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"metasploit\"","tags":["indices"]}},"/index/microsoft-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-csaf\"","tags":["indices"]}},"/index/microsoft-cvrf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-cvrf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-cvrf\"","tags":["indices"]}},"/index/microsoft-driver-block-list":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft's Vulnerable Drivers Blocklist\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-driver-block-list?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-driver-block-list\"","tags":["indices"]}},"/index/microsoft-kb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft KB list by CVE\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-kb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-kb\"","tags":["indices"]}},"/index/mikrotik":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MikroTik Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mikrotik?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mikrotik\"","tags":["indices"]}},"/index/mindray":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mindray Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mindray?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mindray\"","tags":["indices"]}},"/index/misp-threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MISP Threat Actors\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/misp-threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"misp-threat-actors\"","tags":["indices"]}},"/index/mitel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitel\"","tags":["indices"]}},"/index/mitre-attack-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE ATT\u0026CK Technique ID to CVE List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-attack-cve?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitre-attack-cve\"","tags":["indices"]}},"/index/mitre-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitre-cvelist-v5\"","tags":["indices"]}},"/index/mitsubishi-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitsubishi Electric Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitsubishi-electric?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitsubishi-electric\"","tags":["indices"]}},"/index/mongodb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MongoDB Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mongodb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mongodb\"","tags":["indices"]}},"/index/moxa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moxa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/moxa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"moxa\"","tags":["indices"]}},"/index/mozilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mozilla Foundation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mozilla?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mozilla\"","tags":["indices"]}},"/index/naver":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the naver index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Naver Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/naver?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"naver\"","tags":["indices"]}},"/index/ncsc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ncsc\"","tags":["indices"]}},"/index/ncsc-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc-cves?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ncsc-cves\"","tags":["indices"]}},"/index/nec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NEC Security Information Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nec\"","tags":["indices"]}},"/index/nessus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nessus Plugins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nessus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nessus\"","tags":["indices"]}},"/index/netapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NetApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netapp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netapp\"","tags":["indices"]}},"/index/netatalk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netatalk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netatalk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netatalk\"","tags":["indices"]}},"/index/netgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netgate Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgate?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netgate\"","tags":["indices"]}},"/index/netgear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NETGEAR Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgear?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netgear\"","tags":["indices"]}},"/index/netskope":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netskope Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netskope?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netskope\"","tags":["indices"]}},"/index/nexpose":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nexpose Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nexpose?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nexpose\"","tags":["indices"]}},"/index/nginx":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nginx Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nginx?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nginx\"","tags":["indices"]}},"/index/nhs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NHS Cyber Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nhs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nhs\"","tags":["indices"]}},"/index/ni":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ni index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** National Instruments Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ni?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ni\"","tags":["indices"]}},"/index/nist-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd\"","tags":["indices"]}},"/index/nist-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd2\"","tags":["indices"]}},"/index/nist-nvd2-cpematch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 CPE Match\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-cpematch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd2-cpematch\"","tags":["indices"]}},"/index/nist-nvd2-sources":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 Source Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-sources?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd2-sources\"","tags":["indices"]}},"/index/node-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Node.js Security Working Group Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/node-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"node-security\"","tags":["indices"]}},"/index/nodejs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NodeJS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nodejs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nodejs\"","tags":["indices"]}},"/index/nokia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nokia Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nokia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nokia\"","tags":["indices"]}},"/index/notepadplusplus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Notepad++ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/notepadplusplus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"notepadplusplus\"","tags":["indices"]}},"/index/nozomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nozomi Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nozomi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nozomi\"","tags":["indices"]}},"/index/npm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the npm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NPM (JS/TS) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/npm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"npm\"","tags":["indices"]}},"/index/ntp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NTP Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ntp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ntp\"","tags":["indices"]}},"/index/nuclei":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuclei Templates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuclei?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nuclei\"","tags":["indices"]}},"/index/nuget":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuget (C#/F#) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuget?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nuget\"","tags":["indices"]}},"/index/nvd-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVD's CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvd-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nvd-cpe-dictionary\"","tags":["indices"]}},"/index/nvidia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVIDIA Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvidia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nvidia\"","tags":["indices"]}},"/index/nz-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT NZ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nz-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nz-advisories\"","tags":["indices"]}},"/index/octopus-deploy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Octopus Deploy Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/octopus-deploy?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"octopus-deploy\"","tags":["indices"]}},"/index/okta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the okta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Okta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/okta?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"okta\"","tags":["indices"]}},"/index/omron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the omron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Omron Vulnerability Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/omron?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"omron\"","tags":["indices"]}},"/index/one-e":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 1E Published Product Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/one-e?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"one-e\"","tags":["indices"]}},"/index/opam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** opam (OCaml) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opam?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"opam\"","tags":["indices"]}},"/index/open-cvdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Open Cloud Vulnerability \u0026 Security Issue Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/open-cvdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"open-cvdb\"","tags":["indices"]}},"/index/openbsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenBSD Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openbsd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openbsd\"","tags":["indices"]}},"/index/opengear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Opengear Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opengear?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"opengear\"","tags":["indices"]}},"/index/openjdk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenJDK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openjdk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openjdk\"","tags":["indices"]}},"/index/openssh":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSH Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssh?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openssh\"","tags":["indices"]}},"/index/openssl-secadv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSL Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssl-secadv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openssl-secadv\"","tags":["indices"]}},"/index/openstack":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenStack Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openstack?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openstack\"","tags":["indices"]}},"/index/openwrt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenWrt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openwrt?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openwrt\"","tags":["indices"]}},"/index/oracle":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"oracle\"","tags":["indices"]}},"/index/oracle-cpu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Update Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"oracle-cpu\"","tags":["indices"]}},"/index/oracle-cpu-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Updates CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"oracle-cpu-csaf\"","tags":["indices"]}},"/index/osv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the osv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Open Source Vulnerabilities Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/osv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"osv\"","tags":["indices"]}},"/index/otrs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OTRS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/otrs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"otrs\"","tags":["indices"]}},"/index/owncloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OwnCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/owncloud?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"owncloud\"","tags":["indices"]}},"/index/packetstorm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PacketStorm\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/packetstorm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"packetstorm\"","tags":["indices"]}},"/index/palantir":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palantir Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palantir?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"palantir\"","tags":["indices"]}},"/index/palo-alto":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palo Alto Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palo-alto?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"palo-alto\"","tags":["indices"]}},"/index/panasonic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Panasonic Vulnerability Advisory List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/panasonic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"panasonic\"","tags":["indices"]}},"/index/papercut":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PaperCut Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/papercut?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"papercut\"","tags":["indices"]}},"/index/pega":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pega index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pega Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pega?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pega\"","tags":["indices"]}},"/index/philips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the philips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Philips Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/philips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"philips\"","tags":["indices"]}},"/index/phoenix-contact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Phoenix Contact Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/phoenix-contact?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"phoenix-contact\"","tags":["indices"]}},"/index/php-my-admin":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** phpMyAdmin Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/php-my-admin?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"php-my-admin\"","tags":["indices"]}},"/index/pkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PK CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pkcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pkcert\"","tags":["indices"]}},"/index/postgressql":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PostgresSQL Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/postgressql?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"postgressql\"","tags":["indices"]}},"/index/powerdns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PowerDNS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/powerdns?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"powerdns\"","tags":["indices"]}},"/index/progress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the progress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Progress Product Alert Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/progress?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"progress\"","tags":["indices"]}},"/index/proofpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Proofpoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/proofpoint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"proofpoint\"","tags":["indices"]}},"/index/ptc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PTC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ptc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ptc\"","tags":["indices"]}},"/index/pub":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pub index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pub (Dart/Flutter) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pub?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pub\"","tags":["indices"]}},"/index/pure-storage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pure Storage Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pure-storage?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pure-storage\"","tags":["indices"]}},"/index/pypa-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypa-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pypa-advisories\"","tags":["indices"]}},"/index/pypi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPi (Python) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pypi\"","tags":["indices"]}},"/index/qnap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** QNAP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qnap?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qnap\"","tags":["indices"]}},"/index/qqids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QIDs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qqids?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qqids\"","tags":["indices"]}},"/index/qualcomm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualcomm Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualcomm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qualcomm\"","tags":["indices"]}},"/index/qualys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qualys\"","tags":["indices"]}},"/index/qualys-qids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QID\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys-qids?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qualys-qids\"","tags":["indices"]}},"/index/qubes-qsb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qubes Security Bulletin\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qubes-qsb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qubes-qsb\"","tags":["indices"]}},"/index/ransomware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Ransomware\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ransomware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ransomware\"","tags":["indices"]}},"/index/red-lion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red-Lion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/red-lion?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"red-lion\"","tags":["indices"]}},"/index/redhat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red Hat Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"redhat\"","tags":["indices"]}},"/index/redhat-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSAF data for redhat\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat-cves?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"redhat-cves\"","tags":["indices"]}},"/index/renesas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Renesas Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/renesas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"renesas\"","tags":["indices"]}},"/index/revive":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the revive index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Revive Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/revive?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"revive\"","tags":["indices"]}},"/index/roche":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the roche index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Roche Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/roche?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"roche\"","tags":["indices"]}},"/index/rockwell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rockwell Automation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rockwell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rockwell\"","tags":["indices"]}},"/index/rocky":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_Update-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rocky\"","tags":["indices"]}},"/index/rocky-errata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Errata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-errata?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rocky-errata\"","tags":["indices"]}},"/index/rocky-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rocky-purls\"","tags":["indices"]}},"/index/rsync":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rsync Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rsync?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rsync\"","tags":["indices"]}},"/index/ruckus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruckus Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ruckus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ruckus\"","tags":["indices"]}},"/index/rustsec-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** RustSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rustsec-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rustsec-advisories\"","tags":["indices"]}},"/index/sacert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Saudi CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sacert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sacert\"","tags":["indices"]}},"/index/safran":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the safran index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Safran Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/safran?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"safran\"","tags":["indices"]}},"/index/saint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the saint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAINT Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/saint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"saint\"","tags":["indices"]}},"/index/salesforce":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SalesForce Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/salesforce?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"salesforce\"","tags":["indices"]}},"/index/samba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the samba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Samba Security Releases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/samba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"samba\"","tags":["indices"]}},"/index/sandisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sandisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sandisk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sandisk\"","tags":["indices"]}},"/index/sans-dshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SANS DShield Honeypot Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sans-dshield?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sans-dshield\"","tags":["indices"]}},"/index/sap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAP Security Patch Days\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sap?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sap\"","tags":["indices"]}},"/index/schneider-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schneider Electric Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schneider-electric?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"schneider-electric\"","tags":["indices"]}},"/index/schutzwerk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schutzwerk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schutzwerk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"schutzwerk\"","tags":["indices"]}},"/index/sec-consult":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SEC Consult Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sec-consult?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sec-consult\"","tags":["indices"]}},"/index/securitylab":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Lab Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/securitylab?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"securitylab\"","tags":["indices"]}},"/index/seebug":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Seebug Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/seebug?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"seebug\"","tags":["indices"]}},"/index/sel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schweitzer Engineering Laboratories Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sel\"","tags":["indices"]}},"/index/sentinelone":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SentinelOne Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sentinelone?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sentinelone\"","tags":["indices"]}},"/index/servicenow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ServiceNow CVE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/servicenow?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"servicenow\"","tags":["indices"]}},"/index/shadowserver-exploited":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shadowserver Foundation Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shadowserver-exploited?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"shadowserver-exploited\"","tags":["indices"]}},"/index/shielder":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shielder Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shielder?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"shielder\"","tags":["indices"]}},"/index/sick":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sick index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SICK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sick?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sick\"","tags":["indices"]}},"/index/siemens":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Siemens Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/siemens?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"siemens\"","tags":["indices"]}},"/index/sierra-wireless":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sierra Wireless Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sierra-wireless?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sierra-wireless\"","tags":["indices"]}},"/index/sigmahq-sigma-rules":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sigma Rules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sigmahq-sigma-rules?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sigmahq-sigma-rules\"","tags":["indices"]}},"/index/singcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSA Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/singcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"singcert\"","tags":["indices"]}},"/index/sitecore":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sitecore Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sitecore?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sitecore\"","tags":["indices"]}},"/index/slackware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Slackware Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/slackware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"slackware\"","tags":["indices"]}},"/index/solarwinds":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SolarWinds Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solarwinds?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"solarwinds\"","tags":["indices"]}},"/index/solr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Solr CVE Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"solr\"","tags":["indices"]}},"/index/sonatype":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sonatype Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonatype?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sonatype\"","tags":["indices"]}},"/index/sonicwall":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SonicWall Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonicwall?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sonicwall\"","tags":["indices"]}},"/index/spacelabs-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spacelabs Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spacelabs-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"spacelabs-healthcare\"","tags":["indices"]}},"/index/splunk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Splunk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/splunk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"splunk\"","tags":["indices"]}},"/index/spring":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spring index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spring Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spring?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"spring\"","tags":["indices"]}},"/index/ssd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SSD Secure Disclosure Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ssd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ssd\"","tags":["indices"]}},"/index/stormshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stormshield Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stormshield?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"stormshield\"","tags":["indices"]}},"/index/stryker":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stryker Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stryker?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"stryker\"","tags":["indices"]}},"/index/sudo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sudo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sudo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sudo\"","tags":["indices"]}},"/index/suse":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SUSE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"suse\"","tags":["indices"]}},"/index/suse-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Suse Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"suse-security\"","tags":["indices"]}},"/index/swift":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swift index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swift packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swift?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"swift\"","tags":["indices"]}},"/index/swisslog-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swisslog Healthcare CVE Disclosures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swisslog-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"swisslog-healthcare\"","tags":["indices"]}},"/index/symfony":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Symfony Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/symfony?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"symfony\"","tags":["indices"]}},"/index/synacktiv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synacktiv Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synacktiv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"synacktiv\"","tags":["indices"]}},"/index/syncrosoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SyncroSoft Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syncrosoft?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"syncrosoft\"","tags":["indices"]}},"/index/synology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synology?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"synology\"","tags":["indices"]}},"/index/syss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Syss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"syss\"","tags":["indices"]}},"/index/tailscale":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tailscale Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tailscale?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tailscale\"","tags":["indices"]}},"/index/teamviewer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TeamViewer Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/teamviewer?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"teamviewer\"","tags":["indices"]}},"/index/tenable-research-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tenable Research Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tenable-research-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tenable-research-advisories\"","tags":["indices"]}},"/index/tencent":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tencent Vulnerability Risk Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tencent?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tencent\"","tags":["indices"]}},"/index/thales":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thales index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thales Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thales?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"thales\"","tags":["indices"]}},"/index/themissinglink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** the missing link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/themissinglink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"themissinglink\"","tags":["indices"]}},"/index/thermo-fisher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thermo Fisher Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thermo-fisher?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"thermo-fisher\"","tags":["indices"]}},"/index/threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Threat Actors Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"threat-actors\"","tags":["indices"]}},"/index/ti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Texas Instruments Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ti\"","tags":["indices"]}},"/index/tibco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TIBCO Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tibco?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tibco\"","tags":["indices"]}},"/index/tp-link":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TP-Link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tp-link?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tp-link\"","tags":["indices"]}},"/index/trane-technology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trane Technology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trane-technology?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"trane-technology\"","tags":["indices"]}},"/index/trendmicro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trend Micro Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trendmicro?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"trendmicro\"","tags":["indices"]}},"/index/trustwave":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trustwave Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trustwave?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"trustwave\"","tags":["indices"]}},"/index/twcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Taiwan CERT Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/twcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"twcert\"","tags":["indices"]}},"/index/ubiquiti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubiquiti Security Advisory Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubiquiti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ubiquiti\"","tags":["indices"]}},"/index/ubuntu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ubuntu\"","tags":["indices"]}},"/index/ubuntu-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ubuntu-purls\"","tags":["indices"]}},"/index/unify":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unify index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unify Product Security Advisories and Security Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unify?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"unify\"","tags":["indices"]}},"/index/unisoc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** UNISOC Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unisoc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"unisoc\"","tags":["indices"]}},"/index/usd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** usd Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"usd\"","tags":["indices"]}},"/index/usom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** USOM Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"usom\"","tags":["indices"]}},"/index/vandyke":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VanDyke Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vandyke?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vandyke\"","tags":["indices"]}},"/index/vapidlabs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VapidLabs Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vapidlabs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vapidlabs\"","tags":["indices"]}},"/index/vc-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vc-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vc-cpe-dictionary\"","tags":["indices"]}},"/index/vde":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vde index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VDE CERT Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vde?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vde\"","tags":["indices"]}},"/index/veeam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veeam Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veeam?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"veeam\"","tags":["indices"]}},"/index/veritas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veritas Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veritas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"veritas\"","tags":["indices"]}},"/index/virtuozzo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Virtuozzo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/virtuozzo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"virtuozzo\"","tags":["indices"]}},"/index/vlc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VLC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vlc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vlc\"","tags":["indices"]}},"/index/vmware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VMWare Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vmware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vmware\"","tags":["indices"]}},"/index/voidsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VoidSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/voidsec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"voidsec\"","tags":["indices"]}},"/index/vulncheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck\"","tags":["indices"]}},"/index/vulncheck-canaries":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries\"","tags":["indices"]}},"/index/vulncheck-canaries-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (10 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-10d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-10d\"","tags":["indices"]}},"/index/vulncheck-canaries-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (30 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-30d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-30d\"","tags":["indices"]}},"/index/vulncheck-canaries-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (3 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-3d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-3d\"","tags":["indices"]}},"/index/vulncheck-canaries-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (90 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-90d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","type":"string"},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-90d\"","tags":["indices"]}},"/index/vulncheck-config":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Configurations\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-config?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-config\"","tags":["indices"]}},"/index/vulncheck-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-cvelist-v5\"","tags":["indices"]}},"/index/vulncheck-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck KEV\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-kev?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-kev\"","tags":["indices"]}},"/index/vulncheck-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd\"","tags":["indices"]}},"/index/vulncheck-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD V2\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd2\"","tags":["indices"]}},"/index/vulnerability-aliases":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vulnerability Aliases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnerability-aliases?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulnerability-aliases\"","tags":["indices"]}},"/index/vulnrichment":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Vulnrichment\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnrichment?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulnrichment\"","tags":["indices"]}},"/index/vyaire":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vyaire Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vyaire?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vyaire\"","tags":["indices"]}},"/index/watchguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Watchguard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/watchguard?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"watchguard\"","tags":["indices"]}},"/index/whatsapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WhatsApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/whatsapp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"whatsapp\"","tags":["indices"]}},"/index/wibu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wibu Systems Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wibu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wibu\"","tags":["indices"]}},"/index/wireshark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wireshark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wireshark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wireshark\"","tags":["indices"]}},"/index/with-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** With Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/with-secure?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"with-secure\"","tags":["indices"]}},"/index/wolfi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wolfi Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wolfi\"","tags":["indices"]}},"/index/wolfssl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WolfSSL Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfssl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wolfssl\"","tags":["indices"]}},"/index/wordfence":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wordfence Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wordfence?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wordfence\"","tags":["indices"]}},"/index/xen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xen Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xen?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xen\"","tags":["indices"]}},"/index/xerox":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xerox Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xerox?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xerox\"","tags":["indices"]}},"/index/xiaomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xiaomi Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xiaomi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xiaomi\"","tags":["indices"]}},"/index/xylem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xylem Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xylem?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xylem\"","tags":["indices"]}},"/index/yamaha":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yamaha Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yamaha?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"yamaha\"","tags":["indices"]}},"/index/yokogawa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yokogawa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yokogawa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"yokogawa\"","tags":["indices"]}},"/index/yubico":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yubico Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yubico?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"yubico\"","tags":["indices"]}},"/index/zdi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zero Day Initiative Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zdi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zdi\"","tags":["indices"]}},"/index/zebra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zebra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zebra Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zebra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zebra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zebra\"","tags":["indices"]}},"/index/zeroscience":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zeroscience index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZeroScience Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zeroscience?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zeroscience?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zeroscience\"","tags":["indices"]}},"/index/zimbra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zimbra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zimbra Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zimbra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zimbra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zimbra\"","tags":["indices"]}},"/index/zoom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zoom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zoom Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zoom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zoom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zoom\"","tags":["indices"]}},"/index/zscaler":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zscaler index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zscaler Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zscaler?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zscaler?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zscaler\"","tags":["indices"]}},"/index/zuso":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zuso index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZUSO Vulnerability Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zuso?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zuso?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zuso\"","tags":["indices"]}},"/index/zyxel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zyxel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zyxel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zyxel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zyxel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","type":"integer"},{"description":"limit the number of findings in the response","in":"query","name":"limit","type":"integer"},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","type":"string"},{"description":"request server-side paging","enum":["true"],"in":"query","name":"start_cursor","type":"string"},{"description":"direction of the sort","enum":["asc","desc"],"in":"query","name":"order","type":"string"},{"description":"field by which to sort the results","in":"query","name":"sort","type":"string"},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","type":"string"},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","type":"string"},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","type":"string"},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","type":"string"},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","type":"string"},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","type":"string"},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","type":"string"},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","type":"string"},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","type":"string"},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","type":"string"},{"description":"Specify a published date","in":"query","name":"published","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"date","type":"string"},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","type":"string"},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","type":"string"},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","type":"string"},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","type":"string"},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","type":"string"},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zyxel\"","tags":["indices"]}},"/openapi":{"get":{"description":"Return the VulnCheck API (v3) OpenAPI specification","produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"additionalProperties":true,"type":"object"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Return OpenAPI specification","tags":["endpoints"]}},"/pdns/vulncheck-c2":{"get":{"description":"Retrieve a list of hostnames, identified as running Command \u0026 Control infrastructure.","parameters":[{"description":"Format of the Hostnames in the response (Defaults To: text)","enum":["txt","json","text"],"in":"query","name":"format","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"type":"string"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve a list of C2 Hostnames","tags":["endpoints"]}},"/purl":{"get":{"description":"Based on the specified PURL, this endpoint will return a list of vulnerabilities that are related to the package. We currently support hex, golang, hackage, npm, and pypi","parameters":[{"description":"URL string used to identify and locate a software package","in":"query","name":"purl","required":true,"type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Request vulnerabilities related to a PURL","tags":["endpoints"]}},"/purls":{"post":{"description":"Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities","parameters":[{"description":"PURL strings used to identify and locate software packages","in":"body","name":"purls","required":true,"schema":{"items":{"type":"string"},"type":"array"}}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"$ref":"#/definitions/render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Request vulnerabilities related to a list of PURLs","tags":["endpoints"]}},"/rules/initial-access/{type}":{"get":{"description":"Retrieve set of initial-access detection rules by type","parameters":[{"description":"Type of ruleset to retrieve","enum":["snort","suricata"],"in":"path","name":"type","required":true,"type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"type":"string"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve set of initial-access detection rules","tags":["endpoints"]}},"/tags/vulncheck-c2":{"get":{"description":"Retrieve a list of IP addresses, identified as running Command \u0026 Control infrastructure","parameters":[{"description":"Format of the IP Addresses in the response (Defaults To: text)","enum":["txt","json","text"],"in":"query","name":"format","type":"string"}],"produces":["application/json"],"responses":{"200":{"description":"OK","schema":{"type":"string"}},"404":{"description":"Not Found","schema":{"type":"string"}},"500":{"description":"Internal Server Error","schema":{"type":"string"}}},"security":[{"Bearer":[]}],"summary":"Retrieve a list of C2 IP addresses","tags":["endpoints"]}}},"securityDefinitions":{"Bearer":{"in":"header","name":"Authorization","type":"apiKey"}},"swagger":"2.0"} \ No newline at end of file +{"components":{"schemas":{"advisory.A10":{"properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"reference":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ABBAdvisory":{"properties":{"abb_vulnerability_id":{"items":{"type":"string"},"type":"array","uniqueItems":false},"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"document_id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ADP":{"properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"metrics":{"items":{"$ref":"#/components/schemas/advisory.VulnrichmentMetric"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"}},"type":"object"},"advisory.ADPContainer":{"properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"datePublic":{"description":"OK","type":"string"},"descriptions":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false},"impacts":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.Impact"},"type":"array","uniqueItems":false},"metrics":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.Metric"},"type":"array","uniqueItems":false},"problemTypes":{"description":"OK","items":{"$ref":"#/components/schemas/advisory.MProblemTypes"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"},"references":{"items":{"$ref":"#/components/schemas/advisory.MReference"},"type":"array","uniqueItems":false},"tags":{"description":"OK","items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"description":"OK","type":"string"}},"type":"object"},"advisory.AIX":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMD":{"properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AMI":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ASRG":{"properties":{"affected_products":{"type":"string"},"capec":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"problem_type":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVEVAAdvisory":{"properties":{"aveva_vulnerability_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"published_by":{"type":"string"},"rating":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AVIDMLAdvs":{"properties":{"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AWS":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Abbott":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Absolute":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Acknowledgement":{"properties":{"name":{"items":{"$ref":"#/components/schemas/advisory.IVal"},"type":"array","uniqueItems":false},"url":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Acronis":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdobeAdvisory":{"properties":{"adobe_cves":{"items":{"$ref":"#/components/schemas/advisory.AdobeCVE"},"type":"array","uniqueItems":false},"affected":{"items":{"$ref":"#/components/schemas/advisory.AdobeAffected"},"type":"array"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"solutions":{"items":{"$ref":"#/components/schemas/advisory.AdobeSolution"},"type":"array"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AdobeAffected":{"properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AdobeCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.AdobeSolution":{"properties":{"platform":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Advantech":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Advisory":{"properties":{"affects":{"type":"string"},"announced":{"type":"string"},"category":{"type":"string"},"corrections":{"items":{"$ref":"#/components/schemas/advisory.Correction"},"type":"array"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"module":{"type":"string"},"name":{"type":"string"},"topic":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AdvisoryDetails":{"properties":{"bugzilla":{"$ref":"#/components/schemas/advisory.Bugzilla"},"cve":{"$ref":"#/components/schemas/advisory.OvalCVE"},"issued":{"$ref":"#/components/schemas/advisory.Issued"},"severity":{"type":"string"},"updated":{"$ref":"#/components/schemas/advisory.Updated"}},"type":"object"},"advisory.AdvisoryRecord":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"external_id":{"items":{"type":"string"},"type":"array","uniqueItems":false},"lang":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.Affected":{"properties":{"database_specific":{"description":"The meaning of the values within the object is entirely defined by the database"},"ecosystem_specific":{"description":"The meaning of the values within the object is entirely defined by the ecosystem"},"package":{"$ref":"#/components/schemas/advisory.OSVPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.Range"},"type":"array","uniqueItems":false},"severity":{"items":{"$ref":"#/components/schemas/advisory.Severity"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AffectedChrome":{"properties":{"fixed_version":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.AffectedDebianPackage":{"properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRelease":{"properties":{"fixed_version":{"type":"string"},"nodsa":{"type":"string"},"nodsa_reason":{"type":"string"},"release_name":{"type":"string"},"repositories":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianRepository"},"type":"array","uniqueItems":false},"status":{"type":"string"},"urgency":{"type":"string"}},"type":"object"},"advisory.AffectedDebianRepository":{"properties":{"repository_name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AffectedFile":{"properties":{"file_last_modified":{"type":"string"},"file_name":{"type":"string"}},"type":"object"},"advisory.AffectedProduct":{"properties":{"affectedReleases":{"type":"string"},"fixedReleases":{"type":"string"},"lexmarkModels":{"type":"string"}},"type":"object"},"advisory.AffectedRel":{"properties":{"advisory":{"type":"string"},"cpe":{"type":"string"},"package":{"type":"string"},"product_name":{"type":"string"},"release_date":{"type":"string"}},"type":"object"},"advisory.AffectedUbuntuPackage":{"properties":{"break_commit_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fix_commit_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package_name":{"type":"string"},"package_release_status":{"items":{"$ref":"#/components/schemas/advisory.UbuntuPackageReleaseStatus"},"type":"array","uniqueItems":false},"upstream_fix_url":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AlephResearch":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Alibaba":{"properties":{"cnnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation_cn":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AlmaDate":{"properties":{"$date":{"type":"integer"}},"type":"object"},"advisory.AlmaLinuxUpdate":{"properties":{"bs_repo_id":{"$ref":"#/components/schemas/advisory.AlmaObjectID"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fromstr":{"type":"string"},"id":{"$ref":"#/components/schemas/advisory.AlmaObjectID"},"issued_date":{"$ref":"#/components/schemas/advisory.AlmaDate"},"pkglist":{"$ref":"#/components/schemas/advisory.AlmaPackageList"},"pushcount":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.AlmaReference"},"type":"array","uniqueItems":false},"release":{"type":"string"},"rights":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"update_url":{"type":"string"},"updated_date":{"$ref":"#/components/schemas/advisory.AlmaDate"},"updateinfo_id":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaObjectID":{"properties":{"$oid":{"type":"string"}},"type":"object"},"advisory.AlmaPackage":{"properties":{"arch":{"type":"string"},"epoch":{"type":"string"},"filename":{"type":"string"},"name":{"type":"string"},"reboot_suggested":{"type":"integer"},"release":{"type":"string"},"source":{"type":"string"},"sum":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.AlmaPackageList":{"properties":{"name":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.AlmaPackage"},"type":"array","uniqueItems":false},"shortname":{"type":"string"}},"type":"object"},"advisory.AlmaReference":{"properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDB":{"properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"distroversion":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecDBPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.AlpineLinuxSecDBPackage":{"properties":{"package_name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecurityFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AlpineLinuxSecurityFix":{"properties":{"cve":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"advisory.AmazonAffectedPackage":{"properties":{"advisory":{"type":"string"},"package":{"type":"string"},"platform":{"type":"string"},"releaseDate":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.AmazonCVE":{"properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AmazonAffectedPackage"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AnchoreNVDOverride":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"override":{"$ref":"#/components/schemas/advisory.Override"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAdvisory":{"properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AndroidAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.AndroidReference"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AndroidAffected":{"properties":{"ecosystem_specific":{"$ref":"#/components/schemas/advisory.EcoSystem"},"package":{"$ref":"#/components/schemas/advisory.AndroidPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.AndroidRange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.AndroidEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.AndroidPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.AndroidRange":{"properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.AndroidEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.AndroidReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheActiveMQ":{"properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArchiva":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheArrow":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCamel":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCommons":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheCouchDB":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheFlink":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.ApacheGuacamole":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHTTP":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheHadoop":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheJSPWiki":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheKafka":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheLoggingServices":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheNiFi":{"properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOFBiz":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenMeetings":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheOpenOffice":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApachePulsar":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheShiro":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSpark":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheStruts":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"rating":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_version":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ApacheSubversion":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheSuperset":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheTomcat":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ApacheZooKeeper":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppCheck":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Appgate":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleAdvisory":{"properties":{"components":{"items":{"$ref":"#/components/schemas/advisory.AppleComponent"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AppleComponent":{"properties":{"available_for":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"impact":{"type":"string"},"itw_exploit":{"type":"boolean"},"name":{"type":"string"}},"type":"object"},"advisory.ArchIssue":{"properties":{"advisories":{"items":{"type":"string"},"type":"array"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"issues":{"description":"cves","items":{"type":"string"},"type":"array"},"name":{"type":"string"},"packages":{"items":{"type":"string"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"status":{"type":"string"},"ticket":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Arista":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Aruba":{"properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AssetNote":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asterisk":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Astra":{"properties":{"bdu":{"items":{"type":"string"},"type":"array","uniqueItems":false},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_ru":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Asus":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianAdvisory":{"properties":{"affected_version":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"detailed_summary":{"description":"overloading in places with 'RiskAssessment' and other places with\n'Description'","type":"string"},"fixed_version":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"release_date":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.AtlassianProducts":{"properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"}},"type":"object"},"advisory.AtlassianVuln":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"$ref":"#/components/schemas/advisory.AtlassianProducts"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Atredis":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendors":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Audiocodes":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.AusCert":{"properties":{"body":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"link":{"type":"string"},"operatingSystem":{"type":"string"},"product":{"type":"string"},"publisher":{"type":"string"},"resolution":{"type":"string"}},"type":"object"},"advisory.Autodesk":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avaya":{"properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"last_revised":{"type":"string"},"overview":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Avigilon":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Award":{"properties":{"amount":{"type":"string"},"currency":{"type":"string"}},"type":"object"},"advisory.Axis":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Azul":{"properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"prime_version":{"items":{"$ref":"#/components/schemas/advisory.PrimeVersion"},"type":"array","uniqueItems":false},"release":{"type":"string"},"url":{"type":"string"},"zulu_version":{"items":{"$ref":"#/components/schemas/advisory.ZuluVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BBraunAdvisory":{"properties":{"attention":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"equipment":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerabilities":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BDUAdvisory":{"properties":{"bdu_id":{"description":"BDU:2022-03833","type":"string"},"cve":{"description":"[]string{\"CVE-2022-28194\"}","items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"$ref":"#/components/schemas/advisory.BDUCvss"},"cvss3":{"$ref":"#/components/schemas/advisory.BDUCvss3"},"cwe":{"description":"CWE-119","type":"string"},"date_added":{"type":"string"},"description_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"environment":{"$ref":"#/components/schemas/advisory.BDUEnvironment"},"exploit_status_en":{"description":"Exploited","type":"string"},"exploit_status_ru":{"description":"Exploited","type":"string"},"fix_status_en":{"description":"Fixed","type":"string"},"fix_status_ru":{"description":"Fixed","type":"string"},"identify_date":{"description":"2022-09-01","type":"string"},"name_ru":{"description":"BDU:2022-03833: Уязвимость модуля Cboot (tegrabl_cbo.c) пакета драйверов микропрограммного обеспечения вычислительных плат NVIDIA Jetson, позволяющая нарушителю выполнить произвольный код или вызвать частичный отказ в обслуживании","type":"string"},"severity_ru":{"description":"High","type":"string"},"solution_ru":{"description":"Обновите драйверы микропрограммного обеспечения вычислительных плат NVIDIA Jetson до версии 32.6.1 или более поздней","type":"string"},"sources":{"description":"https://nvd.nist.gov/vuln/detail/CVE-2022-28194","items":{"type":"string"},"type":"array","uniqueItems":false},"text_ru":{"description":"Библиотека libxml2 до версии 2.9.12 не корректно обрабатывает XML-документы, содержащие определенные сущности. В результате могут быть выполнены произвольные команды.","type":"string"},"url":{"description":"https://bdu.fstec.ru/vul/2022-03833","type":"string"},"vul_status_en":{"description":"Exploitable","type":"string"},"vul_status_ru":{"description":"Exploitable","type":"string"},"vulnerable_software":{"$ref":"#/components/schemas/advisory.BDUVulnerableSoftware"}},"type":"object"},"advisory.BDUCvss":{"properties":{"vector":{"$ref":"#/components/schemas/advisory.BDUVector"}},"type":"object"},"advisory.BDUCvss3":{"properties":{"vector":{"$ref":"#/components/schemas/advisory.BDUVector"}},"type":"object"},"advisory.BDUEnvironment":{"properties":{"os":{"$ref":"#/components/schemas/advisory.BDUOs"}},"type":"object"},"advisory.BDUOs":{"properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUSoft":{"properties":{"name":{"type":"string"},"platform":{"type":"string"},"text":{"type":"string"},"types":{"$ref":"#/components/schemas/advisory.BDUTypes"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BDUTypes":{"properties":{"text":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.BDUVector":{"properties":{"score":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.BDUVulnerableSoftware":{"properties":{"soft":{"$ref":"#/components/schemas/advisory.BDUSoft"}},"type":"object"},"advisory.BLS":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"prodcut":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Bandr":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"document_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BaxterAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeckhoffAdvisory":{"properties":{"beckhoff_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"description":"if in the future we can delete this great - it's just a dupe to\nnormalize the field names","type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.BeckmanCoulter":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BectonDickinsonAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products_affected":{"items":{"$ref":"#/components/schemas/advisory.ProductsAffected"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BeldenAdvisory":{"properties":{"belden_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.BeyondTrust":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Binarly":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BitDefender":{"properties":{"additional_details":{"type":"string"},"affected_products":{"type":"string"},"affected_vendors":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"details":{"type":"string"},"timeline":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BlackBerry":{"properties":{"bsrt":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BoschAdvisory":{"properties":{"bosch_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.BostonScientificAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Botnet":{"properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"botnet_name":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Bugzilla":{"properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CACyberCentreAdvisory":{"properties":{"control_systems":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"html_url":{"type":"string"},"serial_number":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CBLMariner":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CERTEUAdvisory":{"properties":{"advisoryId":{"type":"string"},"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"history":{"items":{"type":"string"},"type":"array"},"link":{"type":"string"},"recommendations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"technicalDetails":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CESA":{"properties":{"arch":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"issueDate":{"type":"string"},"osRelease":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.CentosPackage"},"type":"array"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CISAAlert":{"properties":{"affectedProducts":{"type":"string"},"alertID":{"type":"string"},"archived":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cveexploitedITW":{"type":"boolean"},"cvss":{"type":"string"},"date_added":{"type":"string"},"icsa":{"type":"boolean"},"icsma":{"type":"boolean"},"mitigations":{"type":"string"},"releaseDate":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.CISControl":{"properties":{"cis_control_description":{"type":"string"},"cis_control_id":{"type":"string"},"cis_control_name":{"type":"string"}},"type":"object"},"advisory.CNNVDEntryJSON":{"properties":{"bugtraq-id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"modified-date":{"type":"string"},"name_cn":{"type":"string"},"published-date":{"type":"string"},"severity_cn":{"type":"string"},"severity_en":{"type":"string"},"source":{"type":"string"},"url":{"type":"string"},"vuln-description_cn":{"type":"string"},"vuln-solution":{"type":"string"},"vuln-type_cn":{"type":"string"},"vuln-type_en":{"type":"string"}},"type":"object"},"advisory.CNVDBulletin":{"properties":{"cnta":{"type":"string"},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CNVDFlaw":{"properties":{"affected_products_cn":{"type":"string"},"bugtraq_id":{"type":"string"},"cnvd":{"type":"string"},"collection_time":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"harm_level":{"type":"string"},"id":{"type":"string"},"public_date":{"type":"string"},"reference_urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"submission_time":{"type":"string"},"title_cn":{"type":"string"},"update_time":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"validation_info_cn":{"type":"string"},"validation_info_en":{"type":"string"},"vendor_patch_cn":{"type":"string"},"vuln_attachments":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vuln_description_cn":{"type":"string"},"vuln_solution_cn":{"type":"string"},"vuln_type_cn":{"type":"string"}},"type":"object"},"advisory.COSUpdate":{"properties":{"changed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"featured":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"reference":{"type":"string"},"security":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated":{"type":"string"}},"type":"object"},"advisory.CPEMatch":{"properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.CPENode":{"properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.CPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.CSAF":{"properties":{"document":{"$ref":"#/components/schemas/advisory.DocumentMetadata"},"notes":{"description":"Notes holds notes associated with the whole document.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3217-document-property---notes","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"product_tree":{"$ref":"#/components/schemas/advisory.ProductBranch"},"vulnerabilities":{"description":"Vulnerabilities contains information about the vulnerabilities,\n(i.e. CVEs), associated threats, and product status.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#323-vulnerabilities-property","items":{"$ref":"#/components/schemas/advisory.CSAFVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CSAFDistribution":{"type":"object"},"advisory.CSAFNote":{"properties":{"audience":{"type":"string"},"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CSAFReference":{"properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CSAFRelationship":{"properties":{"category":{"type":"string"},"full_product_name":{"$ref":"#/components/schemas/advisory.Product"},"product_reference":{"type":"string"},"relates_to_product_reference":{"type":"string"}},"type":"object"},"advisory.CSAFScore":{"properties":{"cvss_v2":{"$ref":"#/components/schemas/advisory.CVSSV2"},"cvss_v3":{"$ref":"#/components/schemas/advisory.CVSSV3"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CSAFVulnerability":{"properties":{"cve":{"description":"MITRE standard Common Vulnerabilities and Exposures (CVE) tracking number for the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3232-vulnerabilities-property---cve","type":"string"},"cwe":{"$ref":"#/components/schemas/advisory.Cwe"},"flags":{"description":"Machine readable flags for products related to vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3235-vulnerabilities-property---flags","items":{"$ref":"#/components/schemas/advisory.Flag"},"type":"array","uniqueItems":false},"ids":{"description":"List of IDs represents a list of unique labels or tracking IDs for the vulnerability (if such information exists).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3236-vulnerabilities-property---ids","items":{"$ref":"#/components/schemas/advisory.TrackingID"},"type":"array","uniqueItems":false},"notes":{"description":"Notes holds notes associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3238-vulnerabilities-property---notes","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"product_status":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Provide details on the status of the referenced product related to the vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3239-vulnerabilities-property---product-status","type":"object"},"references":{"description":"Vulnerability references holds a list of references associated with this vulnerability item.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32310-vulnerabilities-property---references","items":{"$ref":"#/components/schemas/advisory.CSAFReference"},"type":"array","uniqueItems":false},"release_date":{"type":"string"},"remediations":{"description":"Provide details of remediations associated with a Vulnerability\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32312-vulnerabilities-property---remediations","items":{"$ref":"#/components/schemas/advisory.RemediationData"},"type":"array","uniqueItems":false},"scores":{"description":"Scores holds the scores associated with the Vulnerability object.\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32313-vulnerabilities-property---scores\nCurrently only CVSS v3 is supported.","items":{"$ref":"#/components/schemas/advisory.CSAFScore"},"type":"array","uniqueItems":false},"threats":{"description":"Provide details of threats associated with a vulnerability.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#32314-vulnerabilities-property---threats","items":{"$ref":"#/components/schemas/advisory.ThreatData"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CVEDetail":{"properties":{"baseScore":{"type":"string"},"cveid":{"type":"string"},"description":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.CVEDetailsLink":{"properties":{"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.CVEReference":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CVSS":{"properties":{"score":{"type":"string"},"severity":{"type":"string"},"type":{"type":"string"},"vector":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV2":{"properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"}},"type":"object"},"advisory.CVSSV3":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CVSSV40":{"description":"this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics","properties":{"Automatable":{"type":"string"},"Recovery":{"type":"string"},"Safety":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityRequirement":{"type":"string"},"exploitMaturity":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackRequirements":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedSubAvailabilityImpact":{"type":"string"},"modifiedSubConfidentialityImpact":{"type":"string"},"modifiedSubIntegrityImpact":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"modifiedVulnAvailabilityImpact":{"type":"string"},"modifiedVulnConfidentialityImpact":{"type":"string"},"modifiedVulnIntegrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.CVSSV40Threat":{"properties":{"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"advisory.CWENode":{"type":"object"},"advisory.CanvasExploit":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"exploit_pack":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Capec":{"properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"advisory.CarestreamAdvisory":{"properties":{"carestream_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Carrier":{"properties":{"advisory_id":{"type":"string"},"affected_product":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CentosPackage":{"properties":{"filename":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.CertBE":{"properties":{"affected_software":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability_type":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CertFRAdvisory":{"properties":{"affected_systems_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"resume_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"source_fr":{"type":"string"},"title_fr":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIN":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertIRSecurityAlert":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_fa":{"type":"string"},"title_fa":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertSE":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_sv":{"type":"string"},"title_sv":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CertUA":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_ua":{"type":"string"},"title_ua":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ChainGuard":{"properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.ChainGuardPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.ChainGuardPackage":{"properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.ChainGuardSecFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ChainGuardSecFix":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"}},"type":"object"},"advisory.CheckPoint":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Chrome":{"properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.AffectedChrome"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ciena":{"properties":{"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issue_no":{"type":"integer"},"security_advisory_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vulnerable_products":{"items":{"$ref":"#/components/schemas/advisory.VulnerableProduct"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CisaCsafAdv":{"properties":{"csaf_json":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoAdvisory":{"properties":{"ciscoBugId":{"description":"multiple","type":"string"},"csaf":{"type":"string"},"cve":{"description":"multiple","items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf":{"type":"string"},"cwe":{"description":"multiple","type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"identifier":{"type":"string"},"name":{"type":"string"},"related_resources":{"type":"string"},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"totalCount":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"},"workarounds":{"type":"string"},"workflowStatus":{"type":"string"}},"type":"object"},"advisory.CiscoCSAF":{"properties":{"csaf":{},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"identifier":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CiscoKnownGoodValue":{"properties":{"biv_category":{"type":"string"},"biv_hash":{"type":"string"},"date_added":{"type":"string"},"dtype":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"platform":{"type":"string"},"published":{"type":"string"},"sha1":{"type":"string"},"sha256":{"type":"string"},"sha512":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.CitrixAdvisory":{"properties":{"citrixId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"products":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.ClarotyVulnerability":{"properties":{"advisory_url":{"type":"string"},"claroty_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v3":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"product":{"type":"string"},"target":{"type":"string"},"vendor":{"type":"string"},"vendor_advisory_url":{"type":"string"}},"type":"object"},"advisory.CloudBees":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CloudVulnDBAdvisory":{"properties":{"affectedServices":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"}},"type":"object"},"advisory.CodesysAdvisory":{"properties":{"codesys_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVault":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultCVEDetails"},"type":"array","uniqueItems":false},"cvss_range":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"impacted_product":{"$ref":"#/components/schemas/advisory.CommVaultImpactedProduct"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"resolution":{"$ref":"#/components/schemas/advisory.CommVaultResolution"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.CommVaultCVEDetails":{"properties":{"cve_id":{"type":"string"},"cvss":{"type":"string"},"description":{"type":"string"},"external_links":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultImpactedProduct":{"properties":{"description":{"type":"string"},"impacted_product_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultImpactedProductDetails"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultImpactedProductDetails":{"properties":{"affected_versions":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product_name":{"type":"string"},"resolved_versions":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.CommVaultResolution":{"properties":{"description":{"type":"string"},"resolution_details":{"items":{"$ref":"#/components/schemas/advisory.CommVaultResolutionDetails"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CommVaultResolutionDetails":{"properties":{"feature_release":{"type":"string"},"maintenance_release":{"type":"string"}},"type":"object"},"advisory.CompassSecurity":{"properties":{"csnc_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"effect":{"type":"string"},"introduction":{"type":"string"},"product":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"risk":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.ContainerOS":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updates":{"items":{"$ref":"#/components/schemas/advisory.COSUpdate"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.CoreImpactExploit":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"platform":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Correction":{"properties":{"correctedAt":{"type":"string"},"orelease":{"type":"string"},"release":{"type":"string"}},"type":"object"},"advisory.Credit":{"properties":{"lang":{"type":"string"},"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Crestron":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"threat":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.CrowdSec":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"eitw":{"type":"boolean"},"first_seen":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Curl":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"info":{"$ref":"#/components/schemas/advisory.OCurl"},"url":{"type":"string"}},"type":"object"},"advisory.CurlAffected":{"properties":{"ranges":{"items":{"$ref":"#/components/schemas/advisory.CurlRange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CurlCWE":{"properties":{"desc":{"type":"string"},"id":{"type":"string"}},"type":"object"},"advisory.CurlCredit":{"properties":{"name":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.CurlRange":{"properties":{"events":{"items":{"additionalProperties":{"type":"string"},"type":"object"},"type":"array","uniqueItems":false},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Cvrf":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.CvsssV2_3":{"properties":{"basescore":{"type":"string"},"temporalscore":{"type":"string"}},"type":"object"},"advisory.Cwe":{"properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.CweAcceptanceLevel":{"properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.CweData":{"properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Cwes":{"properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.CWENode"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Cycle":{"properties":{"codename":{"type":"string"},"cycle":{"type":"string"},"discontinued":{},"eol":{},"extendedSupport":{},"latest":{"type":"string"},"latestReleaseDate":{"type":"string"},"link":{"type":"string"},"lts":{},"releaseDate":{"type":"string"},"releaseLabel":{"type":"string"},"support":{}},"type":"object"},"advisory.DBSpecific":{"properties":{"CWE":{"$ref":"#/components/schemas/advisory.CurlCWE"},"award":{"$ref":"#/components/schemas/advisory.Award"},"last_affected":{"type":"string"},"package":{"type":"string"},"severity":{"type":"string"},"url":{"type":"string"},"www":{"type":"string"}},"type":"object"},"advisory.DFNCert":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_de":{"type":"string"},"title_de":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DLink":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DNN":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dahua":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DanFossCVEDetails":{"properties":{"base_score":{"type":"string"},"cve":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Danfoss":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_details":{"items":{"$ref":"#/components/schemas/advisory.DanFossCVEDetails"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dassault":{"properties":{"affected_products":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DateTime":{"type":"object"},"advisory.DebianCVE":{"properties":{"cve":{"type":"string"},"debianbug":{"type":"integer"},"description":{"type":"string"},"releases":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianRelease"},"type":"array","uniqueItems":false},"scope":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DebianSecurityAdvisory":{"properties":{"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.AffectedDebianPackage"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dsa":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Dell":{"properties":{"articleNumber":{"type":"string"},"combinedProductList":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dell_cves":{"items":{"$ref":"#/components/schemas/advisory.DellCVE"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DellCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.DeltaAdvisory":{"properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"recommendedAction":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.DistroPackage":{"properties":{"binary":{"type":"boolean"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"license":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"secFixes":{"items":{"$ref":"#/components/schemas/advisory.SecFix"},"type":"array"},"versions":{"items":{"$ref":"#/components/schemas/advisory.DistroVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.DistroVersion":{"properties":{"arch":{"type":"string"},"published_date":{"type":"string"},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Django":{"properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DocumentMetadata":{"description":"Document contains metadata about the CSAF document itself.\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property","properties":{"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/components/schemas/advisory.CSAFDistribution"},"lang":{"type":"string"},"notes":{"description":"used by ncsc","items":{"$ref":"#/components/schemas/advisory.CSAFNote"},"type":"array","uniqueItems":false},"publisher":{"$ref":"#/components/schemas/advisory.Publisher"},"references":{"items":{"$ref":"#/components/schemas/advisory.CSAFReference"},"type":"array","uniqueItems":false},"title":{"description":"Aggregate severity is a vehicle that is provided by the document producer to convey the urgency and\ncriticality with which the one or more vulnerabilities reported should be addressed.","type":"string"},"tracking":{"$ref":"#/components/schemas/advisory.Tracking"}},"type":"object"},"advisory.DocumentPublisher":{"properties":{"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"type":{"description":"the json for this is missing/broke","type":"integer"}},"type":"object"},"advisory.DotCMS":{"properties":{"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"issue_id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.DragosAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.Draytek":{"properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Drupal":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"project":{"type":"string"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLAlibaba":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"eol_date":{"type":"string"},"eol_name":{"type":"string"},"product":{"type":"string"},"release_date":{"type":"string"},"url":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.EOLMicrosoft":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"edition":{"type":"string"},"extended_end_date":{"type":"string"},"mainstream_date":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"release_end_date":{"type":"string"},"release_start_date":{"type":"string"},"retirement_date":{"type":"string"},"start_date":{"type":"string"},"support_policy":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EOLReleaseData":{"properties":{"already_eol":{"type":"boolean"},"branch":{"description":"Alpine Linux","type":"string"},"branch_url":{"description":"Alpine Linux","type":"string"},"codename":{"type":"string"},"cpe":{"type":"string"},"eol_date":{"type":"string"},"eol_date_extended_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_date_premier_support":{"description":"Oracle Linux, Solaris","type":"string"},"eol_elts_date":{"type":"string"},"eol_lts_date":{"type":"string"},"git_branch":{"description":"Alpine Linux","type":"string"},"git_branch_url":{"description":"Alpine Linux","type":"string"},"lts":{"description":"Ubuntu","type":"boolean"},"minor_releases":{"description":"Alpine Linux","items":{"type":"string"},"type":"array","uniqueItems":false},"product":{"type":"string"},"release_date":{"type":"string"},"release_name":{"type":"string"},"source_url":{"type":"string"},"technology_level":{"description":"AIX","type":"string"},"vendor":{"type":"string"},"version":{"type":"string"},"version_api":{"description":"Android","type":"string"},"version_darwin":{"description":"macOS","type":"string"},"version_sunos":{"description":"Solaris","type":"string"},"windows_current_build":{"description":"Microsoft Windows","type":"string"},"windows_display_version":{"description":"Microsoft Windows","type":"string"},"windows_edition_id":{"description":"Microsoft Windows","type":"string"},"windows_insider_preview":{"description":"Microsoft Windows","type":"boolean"}},"type":"object"},"advisory.EUVD":{"properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"assigner":{"type":"string"},"base_score":{"type":"number"},"base_score_vector":{"type":"string"},"base_score_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"enisa_id_product":{"items":{"$ref":"#/components/schemas/advisory.EnisaIDProduct"},"type":"array","uniqueItems":false},"enisa_id_vendor":{"items":{"$ref":"#/components/schemas/advisory.EnisaIDVendor"},"type":"array","uniqueItems":false},"epss":{"type":"number"},"exploited":{"description":"This field is exploited field from endpoint /api/vulnerabilities.\napidocs : https://euvd.enisa.europa.eu/apidoc\nNote: There are records where exploited_since is populated with a valid date,\nbut it still shows up under non_exploitable data set","type":"boolean"},"exploited_since":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.EatonAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"eaton_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EcoSystem":{"properties":{"severity":{"type":"string"},"spl":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Elastic":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"esaid":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Elspec":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmergingThreatsSnort":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"rev":{"type":"string"},"rule_disabled":{"type":"boolean"},"rule_name":{"type":"string"},"sid":{"type":"integer"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EmersonAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"emerson_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EndOfLife":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cycles":{"items":{"$ref":"#/components/schemas/advisory.Cycle"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Endress":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.EnisaIDProduct":{"properties":{"id":{"type":"string"},"product_name":{"type":"string"},"product_version":{"type":"string"}},"type":"object"},"advisory.EnisaIDVendor":{"properties":{"id":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.Event":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"},"last_affected":{"type":"string"},"limit":{"type":"string"}},"type":"object"},"advisory.ExodusIntel":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"disclosed_public":{"type":"string"},"disclosed_vendor":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExploitDBExploitv2":{"properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"edb_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ExternalReferences":{"properties":{"description":{"type":"string"},"external_id":{"type":"string"},"source_name":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.F5":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FSecure":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fanuc":{"properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Fastly":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Festo":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileCloud":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FileZilla":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FixAff":{"properties":{"affected_since":{"type":"string"},"fixed_version":{"type":"string"},"patch_url":{"type":"string"}},"type":"object"},"advisory.Flag":{"properties":{"date":{"type":"string"},"group_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"label":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.FlattSecurity":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ForgeRock":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FortinetAdvisory":{"properties":{"acknowledgement":{"type":"string"},"affectedProducts":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvssv3":{"type":"string"},"date_added":{"type":"string"},"irnumber":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solutions":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.FortinetIPS":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"epss":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Foxit":{"properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.FoxitAffected"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.FoxitAffected":{"properties":{"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Fresenius":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GCP":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEGas":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GEHealthcareAdvisory":{"properties":{"base_score":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHAdvisoryJSONLean":{"properties":{"classification":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"$ref":"#/components/schemas/advisory.GHCvss"},"cwes":{"$ref":"#/components/schemas/advisory.Cwes"},"databaseId":{"type":"integer"},"date_added":{"type":"string"},"description":{"type":"string"},"ghsaId":{"type":"string"},"id":{"type":"string"},"identifiers":{"items":{"$ref":"#/components/schemas/advisory.GHIdentifier"},"type":"array","uniqueItems":false},"notificationsPermalink":{"type":"string"},"origin":{"type":"string"},"permalink":{"type":"string"},"publishedAt":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GHReference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"vulnerabilities":{"$ref":"#/components/schemas/advisory.GHVulnerabilities"},"withdrawnAt":{"type":"string"}},"type":"object"},"advisory.GHCvss":{"properties":{"score":{"type":"number"},"vectorString":{"type":"string"}},"type":"object"},"advisory.GHIdentifier":{"properties":{"type":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.GHNode":{"properties":{"package":{"$ref":"#/components/schemas/advisory.GHPackage"},"severity":{"type":"string"},"updatedAt":{"type":"string"},"vulnerableVersionRange":{"type":"string"}},"type":"object"},"advisory.GHPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHReference":{"properties":{"url":{"type":"string"}},"type":"object"},"advisory.GHSA":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"ghsa":{"$ref":"#/components/schemas/advisory.OriginalGHSA"},"url":{"type":"string"}},"type":"object"},"advisory.GHSAAffected":{"properties":{"ecosystem_specific":{"$ref":"#/components/schemas/advisory.GHSAEcoSystemSpecific"},"package":{"$ref":"#/components/schemas/advisory.GHSAPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.GHSARange"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GHSADatabaseSpecific":{"properties":{"cwe_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"github_reviewed":{"type":"boolean"},"github_reviewed_at":{"type":"string"},"nvd_published_at":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.GHSAEcoSystemSpecific":{"properties":{"affected_functions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GHSAEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GHSAPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GHSARange":{"properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.GHSAEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.GHSAReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GHSASeverity":{"properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.GHVulnerabilities":{"properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.GHNode"},"type":"array","uniqueItems":false},"totalCount":{"type":"integer"}},"type":"object"},"advisory.GMOCyberSecurity":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gallagher":{"properties":{"activeExploitation":{"type":"boolean"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixes":{"type":"string"},"reportedBy":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gen":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"description":"not all of them have this","type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Genetec":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Gigabyte":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.GitHubExploit":{"properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"currently_trending":{"type":"boolean"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"id":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitLabExploit":{"properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GiteeExploit":{"properties":{"clone_https_url":{"type":"string"},"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"cve":{"type":"string"},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"exploit_type":{"type":"string"},"forks":{"type":"integer"},"html_url":{"type":"string"},"language":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_full_path":{"type":"string"},"repo_id":{"type":"string"},"repo_name":{"type":"string"},"repo_owner":{"type":"string"},"stars":{"type":"integer"}},"type":"object"},"advisory.GitlabAdvisory":{"properties":{"affected_range":{"type":"string"},"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v2":{"type":"string"},"cvss_v3":{"type":"string"},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"fixed_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ghsa":{"items":{"type":"string"},"type":"array","uniqueItems":false},"gitlab_url":{"type":"string"},"identifier":{"type":"string"},"identifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"not_impacted":{"type":"string"},"package_manager":{"type":"string"},"package_name":{"type":"string"},"package_slug":{"type":"string"},"pubdate":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"urls":{"items":{"type":"string"},"type":"array","uniqueItems":false},"uuid":{"type":"string"}},"type":"object"},"advisory.Glibc":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GnuTLS":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GoCredits":{"properties":{"name":{"type":"string"}},"type":"object"},"advisory.GoEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.GoVulnAffected":{"properties":{"database_specific":{"$ref":"#/components/schemas/advisory.GoVulnDatabaseSpecific"},"ecosystem_specific":{"$ref":"#/components/schemas/advisory.GoVulnEcosystemSpecific"},"package":{"$ref":"#/components/schemas/advisory.GoVulnPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.GoVulnRanges"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnDatabaseSpecific":{"properties":{"url":{"type":"string"}},"type":"object"},"advisory.GoVulnEcosystemSpecific":{"properties":{"imports":{"items":{"$ref":"#/components/schemas/advisory.GoVulnImport"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnImport":{"properties":{"path":{"type":"string"},"symbols":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnJSON":{"properties":{"advisory_url":{"type":"string"},"affected":{"items":{"$ref":"#/components/schemas/advisory.GoVulnAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.GoCredits"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"ghsa":{"items":{"type":"string"},"type":"array","uniqueItems":false},"go_advisory_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GoVulnReference"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.GoVulnPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.GoVulnRanges":{"properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.GoEvent"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.GoVulnReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Grafana":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseDetection":{"properties":{"category":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"label":{"type":"string"},"name":{"type":"string"},"recommend_block":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"related_tags":{"items":{"$ref":"#/components/schemas/advisory.GreyNoiseTags"},"type":"array","uniqueItems":false},"slug":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.GreyNoiseTags":{"properties":{"category":{"type":"string"},"id":{"type":"string"},"intention":{"type":"string"},"name":{"type":"string"},"slug":{"type":"string"}},"type":"object"},"advisory.HCL":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HIKVision":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.HKCert":{"properties":{"affected":{"items":{"type":"string"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"relatedLinks":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"solutions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.HMS":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"mitigation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HP":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.HPE":{"properties":{"csaf":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hacktivity":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"float64":{"type":"number"},"rank":{"type":"integer"},"reports_submitted":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HardwareUpdate":{"properties":{"affectedVersions":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"hardwarePlatform":{"type":"string"},"system":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.HarmonyOS":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HashiCorp":{"properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"remediation":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HaskellAffected":{"properties":{"affected_constraint":{"type":"string"},"affected_versions":{"items":{"$ref":"#/components/schemas/advisory.HaskellVersion"},"type":"array","uniqueItems":false},"arch":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"os":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package":{"type":"string"}},"type":"object"},"advisory.HaskellSADBAdvisory":{"properties":{"advisory_id":{"type":"string"},"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.HaskellAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"integer"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"keywords":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"type":"object"},"related_vulns":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.HaskellVersion":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.HillromAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Hitachi":{"properties":{"affectedProducts":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixedProducts":{"type":"string"},"hitachiId":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HitachiEnergy":{"properties":{"advisory_id":{"type":"string"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploited":{"type":"boolean"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Honeywell":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Huawei":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"sa_number":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiEulerOS":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"packages":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"synopsis":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.HuaweiIPS":{"properties":{"cnnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"name":{"type":"string"},"severity":{"type":"string"},"threat_id":{"type":"integer"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.IAVA":{"properties":{"IAVA":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.IBM":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ITW":{"properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.ITWExploit":{"properties":{"advisory":{"type":"string"},"affected_versions":{"type":"string"},"analysis_url":{"type":"string"},"bug_introducing_change_list_url":{"type":"string"},"claimed_attribution":{"type":"string"},"claimed_attribution_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_discovered":{"type":"string"},"date_patched":{"type":"string"},"description":{"type":"string"},"first_patched_version":{"type":"string"},"patch_change_list_url":{"type":"string"},"product":{"type":"string"},"reported_by":{"type":"string"},"root_cause_analysis_url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_type":{"type":"string"}},"type":"object"},"advisory.IVal":{"properties":{"Value":{"type":"string"}},"type":"object"},"advisory.Idemia":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"sbid":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IdentificationHelper":{"additionalProperties":{},"type":"object"},"advisory.Igel":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Impact":{"properties":{"capecId":{"type":"string"},"descriptions":{"items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.IncibeAdvisory":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"detail":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Intel":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"link":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.IpIntelRecord":{"properties":{"asn":{"type":"string"},"city":{"type":"string"},"country":{"type":"string"},"country_code":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"feed_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"hostnames":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ip":{"type":"string"},"lastSeen":{"type":"string"},"matches":{"items":{"type":"string"},"type":"array","uniqueItems":false},"port":{"type":"integer"},"ssl":{"type":"boolean"},"type":{"$ref":"#/components/schemas/advisory.RecordType"}},"type":"object"},"advisory.IsraeliAlert":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details_he":{"type":"string"},"handling_he":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary_he":{"type":"string"},"title_he":{"type":"string"}},"type":"object"},"advisory.IsraeliVulnerability":{"properties":{"ILVNId":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Issued":{"type":"object"},"advisory.Istio":{"properties":{"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ivanti":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.IvantiRSS":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JFrog":{"properties":{"cpes":{"items":{"$ref":"#/components/schemas/advisory.NVD20CVECPEMatch"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"product":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.JNJAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVN":{"properties":{"affected_en":{"type":"string"},"affected_ja":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_en":{"type":"string"},"description_ja":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"solution_en":{"type":"string"},"solution_ja":{"type":"string"},"summary_en":{"type":"string"},"summary_ja":{"type":"string"},"title_en":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JVNAdvisoryItem":{"properties":{"cpe":{"items":{"$ref":"#/components/schemas/advisory.JVNCPE"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"items":{"$ref":"#/components/schemas/advisory.CVSS"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"description_en":{"type":"string"},"identifier":{"type":"string"},"issued":{"type":"string"},"modified":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.JVNReference"},"type":"array","uniqueItems":false},"title":{"type":"string"},"title_en":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"url_en":{"type":"string"}},"type":"object"},"advisory.JVNCPE":{"properties":{"cpe":{"type":"string"},"product":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.JVNReference":{"properties":{"id":{"type":"string"},"source":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Jenkins":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fix":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.JetBrains":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"resolved_in":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.JohnsonControls":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Juniper":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss3_score":{"type":"string"},"cvss3_vector":{"type":"string"},"cvss4_score":{"type":"string"},"cvss4_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.K8S":{"properties":{"content":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issue_id":{"type":"integer"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.KEVCatalogVulnerability":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"notes":{"type":"string"},"product":{"type":"string"},"requiredAction":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.KRCertAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_ko":{"type":"string"},"link":{"type":"string"},"overview_ko":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title_ko":{"type":"string"}},"type":"object"},"advisory.KasperskyICSCERTAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"klcert_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kb":{"properties":{"kb_url":{"type":"string"},"ms_date_added":{"type":"string"},"status":{"type":"string"},"supercedence":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.KbThreatDescription":{"properties":{"dos":{"type":"string"},"exploited":{"type":"string"},"latest_software_release":{"type":"string"},"level":{"items":{"type":"string"},"type":"array","uniqueItems":false},"older_software_release":{"type":"string"},"publicly_disclosed":{"type":"string"},"type":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.KoreLogic":{"properties":{"affected_product":{"type":"string"},"affected_vendor":{"type":"string"},"affected_version":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Kunbus":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LG":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lantronix":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Lenovo":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"industry_identifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"last_updated":{"type":"string"},"lenovo_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LexmarkAdvisory":{"properties":{"affectedProducts":{"items":{"$ref":"#/components/schemas/advisory.AffectedProduct"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"impact":{"type":"string"},"lastUpdate":{"type":"string"},"link":{"type":"string"},"publicReleaseDate":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"revision":{"type":"string"},"summary":{"type":"string"},"updated_at":{"type":"string"},"workarounds":{"type":"string"}},"type":"object"},"advisory.LibreOffice":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Linux":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.LogSource":{"properties":{"category":{"type":"string"},"definition":{"type":"string"},"product":{"type":"string"},"service":{"type":"string"}},"type":"object"},"advisory.LolAdvs":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"lol_json":{"additionalProperties":{},"type":"object"},"mitre_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MACert":{"properties":{"affected_systems_fr":{"type":"string"},"assessment_fr":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact_fr":{"type":"string"},"reference":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk_fr":{"type":"string"},"risks_fr":{"type":"string"},"solution_fr":{"type":"string"},"title_fr":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MAffected":{"properties":{"collectionURL":{"type":"string"},"cpes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"defaultStatus":{"type":"string"},"packageName":{"type":"string"},"packageURL":{"type":"string"},"platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product":{"type":"string"},"repo":{"type":"string"},"vendor":{"type":"string"},"versions":{"items":{"$ref":"#/components/schemas/advisory.MVersion"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MBranch":{"properties":{"Branch":{"items":{"$ref":"#/components/schemas/advisory.MBranch"},"type":"array","uniqueItems":false},"FullProductName":{"items":{"$ref":"#/components/schemas/advisory.MFullProductName"},"type":"array","uniqueItems":false},"Items":{"items":{"$ref":"#/components/schemas/advisory.MItem"},"type":"array","uniqueItems":false},"name":{"type":"string"},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MCPEApplicability":{"properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/components/schemas/advisory.MNodes"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"advisory.MCPEMatch":{"properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.MCna":{"properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"cpeApplicability":{"items":{"$ref":"#/components/schemas/advisory.MCPEApplicability"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.Credit"},"type":"array","uniqueItems":false},"descriptions":{"items":{"$ref":"#/components/schemas/advisory.MDescriptions"},"type":"array","uniqueItems":false},"impacts":{"items":{"$ref":"#/components/schemas/advisory.Impact"},"type":"array","uniqueItems":false},"metrics":{"items":{"$ref":"#/components/schemas/advisory.Metric"},"type":"array","uniqueItems":false},"problemTypes":{"items":{"$ref":"#/components/schemas/advisory.MProblemTypes"},"type":"array","uniqueItems":false},"providerMetadata":{"$ref":"#/components/schemas/advisory.MProviderMetadata"},"references":{"items":{"$ref":"#/components/schemas/advisory.MReference"},"type":"array","uniqueItems":false},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"timeline":{"items":{"$ref":"#/components/schemas/advisory.Timeline"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.MContainers":{"properties":{"adp":{"items":{"$ref":"#/components/schemas/advisory.ADPContainer"},"type":"array","uniqueItems":false},"cna":{"$ref":"#/components/schemas/advisory.MCna"}},"type":"object"},"advisory.MCveMetadata":{"properties":{"assignerOrgId":{"type":"string"},"assignerShortName":{"type":"string"},"cveId":{"type":"string"},"datePublished":{"type":"string"},"dateReserved":{"type":"string"},"dateUpdated":{"type":"string"},"state":{"type":"string"}},"type":"object"},"advisory.MCvssV20":{"properties":{"accessVector":{"type":"string"},"attackComplexity":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV30":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV31":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.MCvssV40":{"properties":{"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"automatable":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"privilegesRequired":{"type":"string"},"providerUrgency":{"type":"string"},"recovery":{"type":"string"},"safety":{"type":"string"},"subAvailabilityImpact":{"type":"string"},"subConfidentialityImpact":{"type":"string"},"subIntegrityImpact":{"type":"string"},"userInteraction":{"type":"string"},"valueDensity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"},"vulnAvailabilityImpact":{"type":"string"},"vulnConfidentialityImpact":{"type":"string"},"vulnIntegrityImpact":{"type":"string"},"vulnerabilityResponseEffort":{"type":"string"}},"type":"object"},"advisory.MDescriptions":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MDocumentTracking":{"properties":{"CurrentReleaseDate":{"type":"string"},"InitialReleaseDate":{"type":"string"},"identification":{"$ref":"#/components/schemas/advisory.MIdentification"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/components/schemas/advisory.RRevision"},"type":"array","uniqueItems":false},"status":{"description":"again - change in json/xml","type":"integer"},"version":{"type":"string"}},"type":"object"},"advisory.MEProduct":{"properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.MFiles":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MFullProductName":{"properties":{"CPE":{"type":"string"},"ProductID":{"type":"string"},"Value":{"type":"string"}},"type":"object"},"advisory.MISPValueNoID":{"properties":{"description":{"type":"string"},"meta":{"$ref":"#/components/schemas/advisory.MispMeta"},"related":{"items":{"$ref":"#/components/schemas/advisory.MispRelatedItem"},"type":"array","uniqueItems":false},"value":{"type":"string"}},"type":"object"},"advisory.MITREAttackGroupNoID":{"properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"name":{"type":"string"},"techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechnique"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MIdentification":{"properties":{"alias":{"$ref":"#/components/schemas/advisory.IVal"},"id":{"$ref":"#/components/schemas/advisory.IVal"}},"type":"object"},"advisory.MItem":{"properties":{"Items":{"items":{"$ref":"#/components/schemas/advisory.MItem"},"type":"array","uniqueItems":false},"Name":{"type":"string"},"ProductID":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Value":{"type":"string"}},"type":"object"},"advisory.MNodes":{"properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.MCPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.MProblemTypes":{"properties":{"descriptions":{"items":{"$ref":"#/components/schemas/advisory.PTMDescriptions"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MProductStatus":{"properties":{"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.MProductTree":{"properties":{"Branch":{"items":{"$ref":"#/components/schemas/advisory.MBranch"},"type":"array","uniqueItems":false},"FullProductName":{"items":{"$ref":"#/components/schemas/advisory.MFullProductName"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MProviderMetadata":{"description":"OK","properties":{"dateUpdated":{"description":"FIXME: flip to time","type":"string"},"orgId":{"type":"string"},"shortName":{"type":"string"}},"type":"object"},"advisory.MReference":{"properties":{"name":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.MRemediation":{"properties":{"AffectedFiles":{"items":{"$ref":"#/components/schemas/advisory.AffectedFile"},"type":"array","uniqueItems":false},"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/components/schemas/advisory.IVal"},"FixedBuild":{"type":"string"},"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"RestartRequired":{"$ref":"#/components/schemas/advisory.IVal"},"SubType":{"type":"string"},"Type":{"description":"diff","type":"integer"},"Url":{"type":"string"},"supercedence":{"type":"string"}},"type":"object"},"advisory.MSCVRF":{"properties":{"DocumentTitle":{"$ref":"#/components/schemas/advisory.MSDocumentTitle"},"DocumentTracking":{"$ref":"#/components/schemas/advisory.MDocumentTracking"},"ProductTree":{"$ref":"#/components/schemas/advisory.MProductTree"},"document_type":{"type":"string"},"documentnotes":{"description":"diff","items":{"$ref":"#/components/schemas/advisory.RNote"},"type":"array","uniqueItems":false},"documentpublisher":{"$ref":"#/components/schemas/advisory.DocumentPublisher"},"vulnerability":{"items":{"$ref":"#/components/schemas/advisory.MVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MSDocumentTitle":{"properties":{"Value":{"type":"string"}},"type":"object"},"advisory.MVersion":{"properties":{"lessThan":{"type":"string"},"lessThanOrEqual":{"type":"string"},"status":{"type":"string"},"version":{"type":"string"},"versionType":{"type":"string"}},"type":"object"},"advisory.MVulnerability":{"properties":{"ProductStatuses":{"items":{"$ref":"#/components/schemas/advisory.MProductStatus"},"type":"array","uniqueItems":false},"Remediations":{"items":{"$ref":"#/components/schemas/advisory.MRemediation"},"type":"array","uniqueItems":false},"Threats":{"items":{"$ref":"#/components/schemas/advisory.RThreat"},"type":"array","uniqueItems":false},"acknowledgments":{"items":{"$ref":"#/components/schemas/advisory.Acknowledgement"},"type":"array","uniqueItems":false},"cve":{"type":"string"},"cvssscoresets":{"items":{"$ref":"#/components/schemas/advisory.RScoreSet"},"type":"array","uniqueItems":false},"notes":{"items":{"$ref":"#/components/schemas/advisory.Note"},"type":"array","uniqueItems":false},"ordinal":{"type":"string"},"revisionhistory":{"description":"diff in xml/json","items":{"$ref":"#/components/schemas/advisory.RRevision"},"type":"array","uniqueItems":false},"title":{"$ref":"#/components/schemas/advisory.IVal"}},"type":"object"},"advisory.MaliciousPackage":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"malware":{"$ref":"#/components/schemas/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ManageEngine":{"properties":{"ADVISORY":{"type":"string"},"Added_Time":{"type":"string"},"CVE_Details_Link":{"$ref":"#/components/schemas/advisory.CVEDetailsLink"},"CVE_ID":{"type":"string"},"CVSS_Severity_Rating":{"type":"string"},"Fixed":{"type":"string"},"For_product_search":{"type":"string"},"ID":{"type":"string"},"Product":{"$ref":"#/components/schemas/advisory.MEProduct"},"Product_list":{"items":{"$ref":"#/components/schemas/advisory.MEProduct"},"type":"array","uniqueItems":false},"Product_specific_details":{"items":{"$ref":"#/components/schemas/advisory.ProductSpecificDetail"},"type":"array","uniqueItems":false},"Summary":{"type":"string"},"Version":{"type":"string"},"index_field":{"type":"string"}},"type":"object"},"advisory.ManageEngineAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"manage_engine":{"$ref":"#/components/schemas/advisory.ManageEngine"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MbedTLS":{"properties":{"affects":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfee":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mcafee_score":{"items":{"$ref":"#/components/schemas/advisory.McAfeeScore"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.McAfeeScore":{"properties":{"base":{"type":"string"},"cve":{"type":"string"},"temporal":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.Mediatek":{"properties":{"affected_chipsets":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_software":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"severity":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MedtronicAdvisory":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mendix":{"properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"mendix_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaAdvisories":{"properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.MAffected"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MetaData":{"properties":{"advisory":{"$ref":"#/components/schemas/advisory.AdvisoryDetails"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckPackage"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.OvalReference"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.MetasploitExploit":{"properties":{"author":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Metric":{"properties":{"cvssV2_0":{"$ref":"#/components/schemas/advisory.MCvssV20"},"cvssV3_0":{"$ref":"#/components/schemas/advisory.MCvssV30"},"cvssV3_1":{"$ref":"#/components/schemas/advisory.MCvssV31"},"cvssV4_0":{"$ref":"#/components/schemas/advisory.MCvssV40"},"format":{"type":"string"},"other":{"$ref":"#/components/schemas/advisory.MetricsOther"},"scenarios":{"items":{"$ref":"#/components/schemas/advisory.MetricScenario"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MetricScenario":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.MetricsOther":{"properties":{"content":{"type":"object"},"type":{"type":"string"}},"type":"object"},"advisory.MicrosoftCSAF":{"properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftCVRF":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf":{"$ref":"#/components/schemas/advisory.MSCVRF"},"date_added":{"type":"string"},"exploited_list":{"items":{"$ref":"#/components/schemas/advisory.ITW"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MicrosoftDriverBlockList":{"properties":{"date_added":{"type":"string"},"file_id":{"description":"From FileAttrib or Deny","type":"string"},"file_metadata":{"$ref":"#/components/schemas/advisory.MicrosoftFileMetadata"}},"type":"object"},"advisory.MicrosoftFileMetadata":{"description":"File-level metadata","properties":{"file_name":{"description":"Full path (FilePath + FileName or FriendlyName)","type":"string"},"maximum_file_version":{"type":"string"},"minimum_file_version":{"type":"string"},"product_name":{"type":"string"},"sha1_hash":{"type":"string"},"sha256_hash":{"type":"string"}},"type":"object"},"advisory.MicrosoftKb":{"properties":{"cve":{"type":"string"},"date_added":{"type":"string"},"kbs":{"items":{"$ref":"#/components/schemas/advisory.Kb"},"type":"array","uniqueItems":false},"threat":{"$ref":"#/components/schemas/advisory.KbThreatDescription"},"title":{"type":"string"}},"type":"object"},"advisory.Mikrotik":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Mindray":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MispMeta":{"properties":{"attribution-confidence":{"type":"string"},"cfr-suspected-state-sponsor":{"type":"string"},"cfr-suspected-victims":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cfr-target-category":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cfr-type-of-incident":{"items":{"type":"string"},"type":"array","uniqueItems":false},"country":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"synonyms":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MispRelatedItem":{"properties":{"dest-uuid":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"type":{"type":"string"}},"type":"object"},"advisory.MispValue":{"properties":{"description":{"type":"string"},"meta":{"$ref":"#/components/schemas/advisory.MispMeta"},"related":{"items":{"$ref":"#/components/schemas/advisory.MispRelatedItem"},"type":"array","uniqueItems":false},"uuid":{"type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Mitel":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackRef":{"properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechWithRefs":{"properties":{"domain":{"type":"string"},"id":{"type":"string"},"name":{"type":"string"},"nist_controls":{"items":{"$ref":"#/components/schemas/advisory.NISTControl"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackRef"},"type":"array","uniqueItems":false},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.MitreAttackTechnique":{"properties":{"sub_technique":{"type":"string"},"sub_technique_name":{"type":"string"},"tactic":{"items":{"type":"string"},"type":"array","uniqueItems":false},"technique_id":{"type":"string"},"technique_name":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MitreCVEListV5Ref":{"properties":{"containers":{"$ref":"#/components/schemas/advisory.MContainers"},"cveMetadata":{"$ref":"#/components/schemas/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.MitreGroupCTI":{"properties":{"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"id":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.ExternalReferences"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.MitsubishiElectricAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"description":"could nuke this at some pt in the future as it's a dupe","type":"string"},"mitsubishi_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MongoDB":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MoxaAdvisory":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaAdvisory":{"properties":{"affected_components":{"items":{"$ref":"#/components/schemas/advisory.MozillaComponent"},"type":"array","uniqueItems":false},"bugzilla":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_in":{"items":{"type":"string"},"type":"array","uniqueItems":false},"impact":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"reporter":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.MozillaComponent":{"properties":{"bugzilla":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"description":{"type":"string"},"impact":{"type":"string"},"reporter":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.NCSC":{"properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NCSCCVE":{"properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary_nl":{"type":"string"},"title_nl":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NEC":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"nvd_id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NHS":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"summary":{"type":"string"},"threat_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NI":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"ovewrview":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NISTControl":{"properties":{"cis_controls":{"items":{"$ref":"#/components/schemas/advisory.CISControl"},"type":"array","uniqueItems":false},"nist_control_family":{"type":"string"},"nist_control_id":{"type":"string"},"nist_control_name":{"type":"string"}},"type":"object"},"advisory.NTP":{"properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NVD20CVECPEMatch":{"properties":{"criteria":{"type":"string"},"matchCriteriaId":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"advisory.NVD20Configuration":{"properties":{"negate":{"type":"boolean"},"nodes":{"items":{"$ref":"#/components/schemas/advisory.NVD20Node"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Node":{"properties":{"cpeMatch":{"items":{"$ref":"#/components/schemas/advisory.NVD20CVECPEMatch"},"type":"array","uniqueItems":false},"negate":{"type":"boolean"},"operator":{"type":"string"}},"type":"object"},"advisory.NVD20Source":{"properties":{"contactEmail":{"type":"string"},"created":{"type":"string"},"cweAcceptanceLevel":{"$ref":"#/components/schemas/advisory.CweAcceptanceLevel"},"lastModified":{"type":"string"},"name":{"type":"string"},"sourceIdentifiers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"v3AcceptanceLevel":{"$ref":"#/components/schemas/advisory.V3AcceptanceLevel"}},"type":"object"},"advisory.NVDCPEDictionary":{"properties":{"backupOnly":{"type":"string"}},"type":"object"},"advisory.NZAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"happening":{"type":"string"},"link":{"type":"string"},"lookFor":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"whatToDo":{"type":"string"}},"type":"object"},"advisory.Naver":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nessus":{"properties":{"cpe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploitability_ease":{"description":"seems like only 3 vals for this","type":"string"},"filename":{"type":"string"},"iava":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"script_id":{"type":"integer"},"updated":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NetApp":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"impact":{"type":"string"},"ntap":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netatalk":{"properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgate":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netgear":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"psvn_number":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Netskope":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nexpose":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"identifier":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NginxAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"not_vuln_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false},"patch_pgp":{"type":"string"},"patch_url":{"type":"string"},"severity":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vuln_versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.NodeAuthor":{"properties":{"author":{"type":"string"},"username":{"type":"string"},"website":{"type":"string"}},"type":"object"},"advisory.NodeJS":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NodeSecurity":{"properties":{"affected_environments":{"items":{"type":"string"},"type":"array","uniqueItems":false},"author":{"$ref":"#/components/schemas/advisory.NodeAuthor"},"coordinating_vendor":{"type":"string"},"created_at":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"number"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"integer"},"module_name":{"type":"string"},"overview":{"type":"string"},"patched_versions":{"type":"string"},"publish_date":{"type":"string"},"recommendation":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerable_versions":{"type":"string"}},"type":"object"},"advisory.Nokia":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Note":{"properties":{"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"type":"integer"}},"type":"object"},"advisory.NotePadPlusPlus":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nozomi":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Nuclei":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"template":{"type":"object"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.NvidiaRevision":{"properties":{"date":{"type":"string"},"description":{"type":"string"},"revision":{"type":"string"}},"type":"object"},"advisory.OCurl":{"properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.CurlAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credits":{"items":{"$ref":"#/components/schemas/advisory.CurlCredit"},"type":"array","uniqueItems":false},"database_specific":{"$ref":"#/components/schemas/advisory.DBSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"schema_version":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.OSV":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"osv":{"$ref":"#/components/schemas/advisory.OSVObj"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OSVObj":{"properties":{"affected":{"description":"collection based on https://ossf.github.io/osv-schema/","items":{"$ref":"#/components/schemas/advisory.Affected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.OSVReference"},"type":"array","uniqueItems":false},"related":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"withdrawn":{"type":"string"}},"type":"object"},"advisory.OSVPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.OSVReference":{"properties":{"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OTRS":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"release":{"type":"string"},"risk":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OctopusDeploy":{"properties":{"advisory_number":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Okta":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cwe":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"resolution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Omron":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OneE":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenBSD":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"patch":{"type":"string"},"release":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenCVDB":{"properties":{"affected_platforms":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_services":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"disclosed_at":{"type":"string"},"known_itw_exploitation":{"type":"boolean"},"manual_remediation":{"type":"string"},"published_at":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDK":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"openjdk_cves":{"items":{"$ref":"#/components/schemas/advisory.OpenJDKCVE"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenJDKCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.OpenSSH":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OpenSSLSecAdv":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_updated":{"type":"string"},"description":{"type":"string"},"filename":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/advisory.OpenSSLVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OpenSSLVulnerability":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fixed":{"items":{"$ref":"#/components/schemas/advisory.FixAff"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OpenStack":{"properties":{"affects":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Opengear":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPU":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"product":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OracleCPUCSAF":{"properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.OriginalGHSA":{"properties":{"affected":{"items":{"$ref":"#/components/schemas/advisory.GHSAAffected"},"type":"array","uniqueItems":false},"aliases":{"items":{"type":"string"},"type":"array","uniqueItems":false},"database_specific":{"$ref":"#/components/schemas/advisory.GHSADatabaseSpecific"},"details":{"type":"string"},"id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.GHSAReference"},"type":"array","uniqueItems":false},"schema_version":{"type":"string"},"severity":{"items":{"$ref":"#/components/schemas/advisory.GHSASeverity"},"type":"array","uniqueItems":false},"summary":{"type":"string"}},"type":"object"},"advisory.OvalCVE":{"properties":{"href":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.OvalReference":{"properties":{"ref_id":{"type":"string"},"ref_url":{"type":"string"},"source":{"type":"string"}},"type":"object"},"advisory.Override":{"properties":{"_annotation":{"$ref":"#/components/schemas/advisory.OverrideAnnotation"},"cve":{"$ref":"#/components/schemas/advisory.OverrideCVE"}},"type":"object"},"advisory.OverrideAnnotation":{"properties":{"cve_id":{"type":"string"},"modified":{"type":"string"},"published":{"type":"string"},"reason":{"type":"string"},"snapshot":{"type":"string"},"triage_notes":{"$ref":"#/components/schemas/advisory.TriageNotes"}},"type":"object"},"advisory.OverrideCVE":{"properties":{"configurations":{"items":{"$ref":"#/components/schemas/advisory.OverrideConfiguration"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OverrideConfiguration":{"properties":{"nodes":{"items":{"$ref":"#/components/schemas/advisory.CPENode"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.OwnCloud":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PGFix":{"properties":{"affected":{"type":"string"},"fixed":{"type":"string"}},"type":"object"},"advisory.PHPMyAdmin":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PKCert":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTC":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PTMDescriptions":{"properties":{"cweId":{"type":"string"},"description":{"type":"string"},"lang":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Package":{"properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.PackageStat":{"properties":{"cpe":{"type":"string"},"fix_state":{"type":"string"},"package_name":{"type":"string"},"product_name":{"type":"string"}},"type":"object"},"advisory.PacketstormExploit":{"properties":{"author":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"download_url":{"type":"string"},"md5":{"type":"string"},"summary":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Palantir":{"properties":{"affected_products":{"type":"string"},"background":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaloAltoAdvisory":{"properties":{"affected":{"type":"string"},"applicableVersions":{"type":"string"},"attackComplexity":{"type":"string"},"attackRequirements":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"confidentialityImpact":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvssbaseScore":{"type":"string"},"datePublished":{"type":"string"},"dateUpdated":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"problem":{"type":"string"},"product":{"type":"string"},"scope":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"unaffected":{"type":"string"},"url":{"type":"string"},"userInteraction":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.Panasonic":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PaperCut":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Patch":{"properties":{"advisory_id":{"type":"string"},"component":{"type":"string"},"link":{"type":"string"},"os_sw":{"type":"string"}},"type":"object"},"advisory.Pega":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhilipsAdvisory":{"properties":{"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_updated":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PhoenixContactAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.PostgresSQL":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"pg_fix":{"items":{"$ref":"#/components/schemas/advisory.PGFix"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PowerDNS":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PrimeVersion":{"properties":{"jdK":{"type":"string"},"prime":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.Product":{"properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/components/schemas/advisory.IdentificationHelper"}},"type":"object"},"advisory.ProductBranch":{"description":"ProductTree contains information about the product tree (branches only).\n\nhttps://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property","properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.ProductBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/components/schemas/advisory.Product"},"relationships":{"items":{"$ref":"#/components/schemas/advisory.CSAFRelationship"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ProductSpecificDetail":{"properties":{"ID":{"type":"string"},"display_value":{"type":"string"}},"type":"object"},"advisory.ProductsAffected":{"properties":{"cve":{"type":"string"},"description":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.Progress":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Proofpoint":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Publisher":{"properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"issuing_authority":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.PureStorage":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"description":{"type":"string"},"product":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.PyPAAdvisory":{"properties":{"advisory_id":{"description":"ID is the PYSEC- identifier","type":"string"},"affected":{"description":"Affected will list out the vulnerable versions.","items":{"$ref":"#/components/schemas/advisory.PyPAAffected"},"type":"array","uniqueItems":false},"aliases":{"description":"Aliases are other identifiers that refer to this, such as a CVE","items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"description":"Details discuss the vulnerability information","type":"string"},"modified":{"description":"Modified is non-zero Time if entry was updated","type":"string"},"published":{"description":"Published is the datetime when this was released","type":"string"},"references":{"description":"References are links to more detailed advisories, fixes, etc.","items":{"$ref":"#/components/schemas/advisory.PyPAReference"},"type":"array","uniqueItems":false},"was_withdrawn":{"description":"WasWD indicates if the advisory was withdrawn or not.","type":"boolean"},"withdrawn":{"description":"Withdrawn is non-zero if this advisory has been withdrawn","type":"string"}},"type":"object"},"advisory.PyPAAffected":{"properties":{"package":{"$ref":"#/components/schemas/advisory.PyPAPackage"},"ranges":{"items":{"$ref":"#/components/schemas/advisory.PyPARange"},"type":"array","uniqueItems":false},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.PyPAEvent":{"properties":{"fixed":{"type":"string"},"introduced":{"type":"string"}},"type":"object"},"advisory.PyPAPackage":{"properties":{"ecosystem":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"}},"type":"object"},"advisory.PyPARange":{"properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.PyPAEvent"},"type":"array","uniqueItems":false},"ranges_type":{"type":"string"}},"type":"object"},"advisory.PyPAReference":{"properties":{"refs_type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QNAPAdvisory":{"properties":{"affected":{"type":"string"},"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"last_update_date":{"type":"string"},"link":{"type":"string"},"severity":{"type":"string"},"severity_number":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.QQID":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss3_score":{"type":"string"},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"qid":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QSB":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualcomm":{"properties":{"chipsets":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"score":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Qualys":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"exploits":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.QualysQID":{"properties":{"consequence":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_v2":{"items":{"$ref":"#/components/schemas/advisory.CvsssV2_3"},"type":"array","uniqueItems":false},"cvss_v3":{"items":{"$ref":"#/components/schemas/advisory.CvsssV2_3"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_insert":{"type":"string"},"description":{"type":"string"},"patches":{"items":{"$ref":"#/components/schemas/advisory.Patch"},"type":"array","uniqueItems":false},"published":{"type":"string"},"qid":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vendor_refs":{"items":{"$ref":"#/components/schemas/advisory.VendorRef"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RDescription":{"properties":{"value":{"type":"string"}},"type":"object"},"advisory.RNote":{"properties":{"audience":{"type":"string"},"ordinal":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"},"type":{"description":"diff between xml \u0026\u0026 json","type":"integer"}},"type":"object"},"advisory.RRevision":{"properties":{"date":{"type":"string"},"description":{"$ref":"#/components/schemas/advisory.RDescription"},"number":{"type":"string"}},"type":"object"},"advisory.RScoreSet":{"properties":{"base_score":{"type":"string"},"product_id":{"type":"string"},"temporal_score":{"type":"string"},"vector":{"type":"string"}},"type":"object"},"advisory.RThreat":{"properties":{"Date":{"type":"string"},"DateSpecified":{"type":"boolean"},"Description":{"$ref":"#/components/schemas/advisory.IVal"},"ProductID":{"items":{"type":"string"},"type":"array","uniqueItems":false},"Type":{"description":"diff","type":"integer"}},"type":"object"},"advisory.Range":{"properties":{"events":{"items":{"$ref":"#/components/schemas/advisory.Event"},"type":"array","uniqueItems":false},"repo":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RansomwareExploit":{"properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"ransomware_family":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RecordType":{"properties":{"finding":{"type":"string"},"id":{"type":"string"},"kind":{"type":"string"}},"type":"object"},"advisory.RedLion":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RedhatCVE":{"properties":{"advisories":{"items":{"type":"string"},"type":"array","uniqueItems":false},"advisory_csaf_vex_url":{"items":{"type":"string"},"type":"array","uniqueItems":false},"affected_packages":{"description":"used for un-marshlling from redhat","items":{"type":"string"},"type":"array","uniqueItems":false},"affected_release":{"items":{"$ref":"#/components/schemas/advisory.AffectedRel"},"type":"array","uniqueItems":false},"bugzilla":{"type":"string"},"bugzilla_description":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve_csaf_vex_url":{"type":"string"},"cvss3_score":{"type":"string"},"cvss3_scoring_vector":{"type":"string"},"cvss_score":{"type":"number"},"cvss_scoring_vector":{"type":"string"},"cwe":{"type":"string"},"package_state":{"items":{"$ref":"#/components/schemas/advisory.PackageStat"},"type":"array","uniqueItems":false},"packages":{"description":"used to index into vulncheck OS","items":{"$ref":"#/components/schemas/advisory.VulnCheckPackage"},"type":"array","uniqueItems":false},"public_date":{"type":"string"},"resource_url":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Reference":{"properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RelatedRule":{"properties":{"id":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RemediationData":{"properties":{"category":{"type":"string"},"date":{"type":"string"},"details":{"type":"string"},"entitlements":{"items":{"type":"string"},"type":"array","uniqueItems":false},"group_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"restart_required":{"$ref":"#/components/schemas/advisory.RestartData"}},"type":"object"},"advisory.Renesas":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ReportedExploit":{"properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RestartData":{"properties":{"category":{"type":"string"},"details":{"type":"string"}},"type":"object"},"advisory.RevisionHistory":{"properties":{"date":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Revive":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RhelCVE":{"properties":{"csaf":{"$ref":"#/components/schemas/advisory.CSAF"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Roche":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"roche_cves":{"items":{"$ref":"#/components/schemas/advisory.RocheCVE"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RocheCVE":{"properties":{"cve":{"type":"string"},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"}},"type":"object"},"advisory.Rockwell":{"properties":{"affected_products":{"items":{"$ref":"#/components/schemas/advisory.RockwellAffectedProduct"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"impact":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RockwellAffectedProduct":{"properties":{"affectedCatalogNumber":{"type":"string"},"affectedVersion":{"type":"string"},"correctedVersion":{"type":"string"},"cve":{"type":"string"},"product":{"type":"string"}},"type":"object"},"advisory.RockyAdvisory":{"properties":{"affectedProducts":{"items":{"type":"string"},"type":"array","uniqueItems":false},"buildReferences":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cves":{"items":{"$ref":"#/components/schemas/advisory.RockyCve"},"type":"array","uniqueItems":false},"description":{"type":"string"},"fixes":{"items":{"$ref":"#/components/schemas/advisory.RockyFix"},"type":"array","uniqueItems":false},"name":{"type":"string"},"publishedAt":{"type":"string"},"rebootSuggested":{"type":"boolean"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"rpms":{"$ref":"#/components/schemas/advisory.RockyRpms"},"severity":{"type":"string"},"shortCode":{"type":"string"},"solution":{"type":"string"},"synopsis":{"type":"string"},"topic":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.RockyCve":{"properties":{"cvss3BaseScore":{"type":"string"},"cvss3ScoringVector":{"type":"string"},"cwe":{"type":"string"},"name":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"}},"type":"object"},"advisory.RockyErrata":{"properties":{"advisory":{"$ref":"#/components/schemas/advisory.RockyAdvisory"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.RockyPackage"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.RockyFix":{"properties":{"description":{"type":"string"},"sourceBy":{"type":"string"},"sourceLink":{"type":"string"},"ticket":{"type":"string"}},"type":"object"},"advisory.RockyPackage":{"properties":{"distro":{"type":"string"},"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.RockyRpms":{"additionalProperties":{"$ref":"#/components/schemas/advisory.RockyVersion"},"type":"object"},"advisory.RockyVersion":{"properties":{"nvras":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Rsync":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ruckus":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.RustsecAdvisory":{"properties":{"advisory":{"$ref":"#/components/schemas/advisory.RustsecFrontMatterAdvisory"},"affected":{"$ref":"#/components/schemas/advisory.RustsecAffected"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"versions":{"$ref":"#/components/schemas/advisory.RustsecFrontMatterVersions"}},"type":"object"},"advisory.RustsecAffected":{"properties":{"arch":{"items":{"type":"string"},"type":"array","uniqueItems":false},"functions":{"type":"string"},"os":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.RustsecFrontMatterAdvisory":{"properties":{"aliases":{"description":"Vulnerability aliases, e.g. CVE IDs (optional but recommended)\nRequest a CVE for your RustSec vulns: https://iwantacve.org/","items":{"type":"string"},"type":"array","uniqueItems":false},"categories":{"description":"Optional: Categories this advisory falls under. Valid categories are:\n\"code-execution\", \"crypto-failure\", \"denial-of-service\", \"file-disclosure\"\n\"format-injection\", \"memory-corruption\", \"memory-exposure\", \"privilege-escalation\"","items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"description":"Optional: a Common Vulnerability Scoring System score. More information\ncan be found on the CVSS website, https://www.first.org/cvss/.","type":"string"},"date":{"description":"Disclosure date of the advisory as an RFC 3339 date (mandatory)","type":"string"},"informational":{"description":"Optional: Indicates the type of informational security advisory\n - \"unsound\" for soundness issues\n - \"unmaintained\" for crates that are no longer maintained\n - \"notice\" for other informational notices","type":"string"},"keywords":{"description":"Freeform keywords which describe this vulnerability, similar to Cargo (optional)","items":{"type":"string"},"type":"array","uniqueItems":false},"package":{"description":"Name of the affected crate (mandatory)","type":"string"},"references":{"description":"URL to additional helpful references regarding the advisory (optional)","items":{"type":"string"},"type":"array","uniqueItems":false},"related":{"description":"Related vulnerabilities (optional)\ne.g. CVE for a C library wrapped by a -sys crate)","items":{"type":"string"},"type":"array","uniqueItems":false},"rustsec_id":{"description":"Identifier for the advisory (mandatory). Will be assigned a \"RUSTSEC-YYYY-NNNN\"\nidentifier e.g. RUSTSEC-2018-0001. Please use \"RUSTSEC-0000-0000\" in PRs.","type":"string"},"url":{"description":"URL to a long-form description of this issue, e.g. a GitHub issue/PR,\na change log entry, or a blogpost announcing the release (optional)","type":"string"},"withdrawn":{"description":"Whether the advisory is withdrawn (optional)","type":"string"}},"type":"object"},"advisory.RustsecFrontMatterVersions":{"properties":{"patched":{"items":{"type":"string"},"type":"array","uniqueItems":false},"unaffected":{"description":"Versions which were never vulnerable (optional)","items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SAAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"severity":{"type":"string"},"threats":{"type":"string"},"vendor":{"type":"string"},"warningDate":{"type":"string"},"warningNumber":{"type":"string"}},"type":"object"},"advisory.SAP":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SECConsult":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SSASource":{"properties":{"document":{"$ref":"#/components/schemas/advisory.SiemensDocument"},"product_tree":{"$ref":"#/components/schemas/advisory.SiemensProductTree"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/advisory.SiemensVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SSDAdvisory":{"properties":{"analysis":{"type":"string"},"credit":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"poc":{"description":"contains actual poc code","type":"string"},"published":{"type":"string"},"response_ref":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Safran":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SaintExploit":{"properties":{"bid":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"string"},"osvdb":{"type":"string"},"saint_id":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SalesForce":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"type":"integer"},"link":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.Samba":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"issues":{"type":"string"},"patches":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Sandisk":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SansDshield":{"properties":{"count":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"firstSeen":{"type":"string"},"lastSeen":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SchneiderCVE":{"properties":{"cve":{"type":"string"},"cvss_score3":{"type":"string"},"cvss_score4":{"type":"string"},"cvss_vector3":{"type":"string"},"cvss_vector4":{"type":"string"}},"type":"object"},"advisory.SchneiderElectricAdvisory":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"pdf_url":{"type":"string"},"schneider_cves":{"items":{"$ref":"#/components/schemas/advisory.SchneiderCVE"},"type":"array","uniqueItems":false},"schneider_electric_id":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Schutzwerk":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SecFix":{"properties":{"arch":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"release":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SecurityBulletin":{"properties":{"acknowledgement":{"type":"string"},"bulletinId":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvedetails":{"items":{"$ref":"#/components/schemas/advisory.CVEDetail"},"type":"array"},"date_added":{"type":"string"},"hardwareUpdates":{"items":{"$ref":"#/components/schemas/advisory.HardwareUpdate"},"type":"array"},"lastUpdated":{"type":"string"},"link":{"type":"string"},"revisions":{"items":{"$ref":"#/components/schemas/advisory.NvidiaRevision"},"type":"array"},"severity":{"type":"string"},"softwareUpdates":{"items":{"$ref":"#/components/schemas/advisory.SoftwareUpdate"},"type":"array"},"title":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SecurityLab":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"title_ru":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.SeebugExploit":{"properties":{"author":{"type":"string"},"category":{"type":"string"},"cnnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cnvd":{"items":{"type":"string"},"type":"array","uniqueItems":false},"component":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"find_time":{"type":"string"},"name":{"type":"string"},"ssv_id":{"type":"string"},"submitter":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sel":{"properties":{"acknowledgement":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SentinelOne":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ServiceNow":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SevenZip":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Severity":{"properties":{"score":{"type":"string"},"type":{"type":"string"}},"type":"object"},"advisory.ShadowServerExploitedVulnerability":{"properties":{"cnvd":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"detections_last_1_day":{"type":"integer"},"detections_last_30_days":{"type":"integer"},"detections_last_7_days":{"type":"integer"},"detections_last_90_days":{"type":"integer"},"edb":{"type":"string"},"in_kev":{"type":"boolean"},"is_iot":{"type":"boolean"},"is_ransomware":{"type":"boolean"},"product":{"type":"string"},"url":{"type":"string"},"vendor":{"type":"string"},"vulnerability_id":{"type":"string"},"vulnerability_link":{"type":"string"}},"type":"object"},"advisory.Shielder":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sick":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"id":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SiemensAcknowledgments":{"properties":{"names":{"items":{"type":"string"},"type":"array","uniqueItems":false},"organization":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensAdvisory":{"properties":{"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvrf_url":{"type":"string"},"date_added":{"type":"string"},"html_url":{"type":"string"},"id":{"type":"string"},"last_update":{"description":"could potentially kill this in the future as it's a dupe","type":"string"},"pdf_url":{"type":"string"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"ssa":{"$ref":"#/components/schemas/advisory.SSASource"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"txt_url":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.SiemensBranch":{"properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensSubBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensCVSSV3":{"properties":{"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensCWE":{"properties":{"id":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensDistribution":{"properties":{"text":{"type":"string"},"tlp":{"$ref":"#/components/schemas/advisory.SiemensTLP"}},"type":"object"},"advisory.SiemensDocument":{"properties":{"acknowledgments":{"items":{"$ref":"#/components/schemas/advisory.SiemensAcknowledgments"},"type":"array","uniqueItems":false},"category":{"type":"string"},"csaf_version":{"type":"string"},"distribution":{"$ref":"#/components/schemas/advisory.SiemensDistribution"},"notes":{"items":{"$ref":"#/components/schemas/advisory.SiemensNotes"},"type":"array","uniqueItems":false},"publisher":{"$ref":"#/components/schemas/advisory.SiemensPublisher"},"references":{"items":{"$ref":"#/components/schemas/advisory.SiemensReferences"},"type":"array","uniqueItems":false},"title":{"type":"string"},"tracking":{"$ref":"#/components/schemas/advisory.SiemensTracking"}},"type":"object"},"advisory.SiemensEngine":{"properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensGenerator":{"properties":{"engine":{"$ref":"#/components/schemas/advisory.SiemensEngine"}},"type":"object"},"advisory.SiemensNotes":{"properties":{"category":{"type":"string"},"text":{"type":"string"},"title":{"type":"string"}},"type":"object"},"advisory.SiemensProduct":{"properties":{"name":{"type":"string"},"product_id":{"type":"string"},"product_identification_helper":{"$ref":"#/components/schemas/advisory.SiemensProductIdentificationHelper"}},"type":"object"},"advisory.SiemensProductIdentificationHelper":{"properties":{"model_numbers":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensProductStatus":{"properties":{"known_affected":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensProductTree":{"properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensBranch"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensPublisher":{"properties":{"category":{"type":"string"},"contact_details":{"type":"string"},"name":{"type":"string"},"namespace":{"type":"string"}},"type":"object"},"advisory.SiemensReferences":{"properties":{"category":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRemediation":{"properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"advisory.SiemensRevisionHistory":{"properties":{"date":{"type":"string"},"legacy_version":{"type":"string"},"number":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.SiemensScore":{"properties":{"cvss_v3":{"$ref":"#/components/schemas/advisory.SiemensCVSSV3"},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SiemensSubBranch":{"properties":{"branches":{"items":{"$ref":"#/components/schemas/advisory.SiemensSubSubBranch"},"type":"array","uniqueItems":false},"category":{"type":"string"},"name":{"type":"string"}},"type":"object"},"advisory.SiemensSubSubBranch":{"properties":{"category":{"type":"string"},"name":{"type":"string"},"product":{"$ref":"#/components/schemas/advisory.SiemensProduct"}},"type":"object"},"advisory.SiemensTLP":{"properties":{"label":{"type":"string"}},"type":"object"},"advisory.SiemensTracking":{"properties":{"current_release_date":{"type":"string"},"generator":{"$ref":"#/components/schemas/advisory.SiemensGenerator"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/components/schemas/advisory.SiemensRevisionHistory"},"type":"array","uniqueItems":false},"status":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.SiemensVulnerability":{"properties":{"cve":{"type":"string"},"cwe":{"$ref":"#/components/schemas/advisory.SiemensCWE"},"notes":{"items":{"$ref":"#/components/schemas/advisory.SiemensNotes"},"type":"array","uniqueItems":false},"product_status":{"$ref":"#/components/schemas/advisory.SiemensProductStatus"},"references":{"items":{"$ref":"#/components/schemas/advisory.SiemensReferences"},"type":"array","uniqueItems":false},"remediations":{"items":{"$ref":"#/components/schemas/advisory.SiemensRemediation"},"type":"array","uniqueItems":false},"scores":{"items":{"$ref":"#/components/schemas/advisory.SiemensScore"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SierraWireless":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"swid":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRule":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_attack_techniques":{"items":{"type":"string"},"type":"array","uniqueItems":false},"sigma_rule":{"$ref":"#/components/schemas/advisory.SigmaRuleRule"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SigmaRuleRule":{"properties":{"author":{"type":"string"},"date":{"type":"string"},"description":{"type":"string"},"detection":{"additionalProperties":{},"type":"object"},"false_positives":{"items":{"type":"string"},"type":"array","uniqueItems":false},"fields":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"level":{"type":"string"},"logsource":{"$ref":"#/components/schemas/advisory.LogSource"},"modified":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"related":{"items":{"$ref":"#/components/schemas/advisory.RelatedRule"},"type":"array","uniqueItems":false},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"}},"type":"object"},"advisory.SingCert":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"link":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"summary":{"type":"string"},"title":{"type":"string"},"updated":{"type":"string"}},"type":"object"},"advisory.Sitecore":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"refs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"summary_ja":{"type":"string"},"title":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Slackware":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SoftwareUpdate":{"properties":{"affectedVersion":{"type":"string"},"cves":{"items":{"type":"string"},"type":"array"},"operatingSystem":{"type":"string"},"softwareProduct":{"type":"string"},"updatedVersion":{"type":"string"}},"type":"object"},"advisory.SolarWindsAdvisory":{"properties":{"affected_products":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"date_added":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Solr":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sonatype":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SonicWallAdvisory":{"properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"number"},"cwe":{"type":"string"},"date_added":{"type":"string"},"impact":{"type":"string"},"is_workaround_available":{"type":"boolean"},"last_updated_when":{"type":"string"},"published_when":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"vuln_status":{"type":"string"},"vulnerable_products_list":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.SpacelabsHealthcareAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Splunk":{"properties":{"advisory_id":{"type":"string"},"affected_products":{"items":{"$ref":"#/components/schemas/advisory.SplunkProduct"},"type":"array","uniqueItems":false},"bug_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SplunkProduct":{"properties":{"affected_version":{"type":"string"},"component":{"type":"string"},"fixed_version":{"type":"string"},"product":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Spring":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Stormshield":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.StrykerAdvisory":{"properties":{"affected_components":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Sudo":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"fix":{"type":"string"},"impact":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"workaround":{"type":"string"}},"type":"object"},"advisory.SuseSecurity":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SwisslogHealthcareAdvisory":{"properties":{"affected_components":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Symfony":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synacktiv":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.SyncroSoft":{"properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Synology":{"properties":{"affected_products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"last_updated":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"status":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Syss":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TI":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"incident_id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TPLink":{"properties":{"bulletin_id":{"type":"integer"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TWCertAdvisory":{"properties":{"affected_cn":{"type":"string"},"affected_en":{"type":"string"},"credit_cn":{"type":"string"},"credit_en":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description_cn":{"type":"string"},"description_en":{"type":"string"},"link":{"type":"string"},"solution_cn":{"type":"string"},"solution_en":{"type":"string"},"title_cn":{"type":"string"},"title_en":{"type":"string"},"tvnid":{"type":"string"}},"type":"object"},"advisory.Tailscale":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TalosAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"talos_id":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TeamViewer":{"properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TenableResearchAdvisory":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tencent":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary_cn":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Thales":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TheMissingLink":{"properties":{"affected_versions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed_versions":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ThermoFisher":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ThreatActorWithExternalObjects":{"properties":{"associated_capecs":{"items":{"$ref":"#/components/schemas/advisory.Capec"},"type":"array","uniqueItems":false},"associated_cwes":{"items":{"$ref":"#/components/schemas/advisory.CweData"},"type":"array","uniqueItems":false},"associated_mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/advisory.MitreAttackTechWithRefs"},"type":"array","uniqueItems":false},"country":{"type":"string"},"cve_references":{"items":{"$ref":"#/components/schemas/advisory.CVEReference"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"malpedia_url":{"type":"string"},"misp_id":{"type":"string"},"misp_threat_actor":{"$ref":"#/components/schemas/advisory.MISPValueNoID"},"mitre_attack_group":{"$ref":"#/components/schemas/advisory.MITREAttackGroupNoID"},"mitre_group_cti":{"$ref":"#/components/schemas/advisory.MitreGroupCTI"},"mitre_id":{"type":"string"},"threat_actor_name":{"type":"string"},"tools":{"items":{"$ref":"#/components/schemas/advisory.Tool"},"type":"array","uniqueItems":false},"vendor_names_for_threat_actors":{"items":{"$ref":"#/components/schemas/advisory.VendorNameForThreatActor"},"type":"array","uniqueItems":false},"vendors_and_products_targeted":{"items":{"$ref":"#/components/schemas/advisory.VendorProduct"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ThreatData":{"properties":{"category":{"type":"string"},"details":{"type":"string"},"product_ids":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Tibco":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"overview":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Timeline":{"properties":{"lang":{"type":"string"},"time":{"description":"FIXME: flip to time","type":"string"},"value":{"type":"string"}},"type":"object"},"advisory.Tool":{"properties":{"name":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/advisory.ToolRef"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.ToolRef":{"properties":{"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Tracking":{"properties":{"current_release_date":{"type":"string"},"id":{"type":"string"},"initial_release_date":{"type":"string"},"revision_history":{"items":{"$ref":"#/components/schemas/advisory.RevisionHistory"},"type":"array","uniqueItems":false},"status":{"type":"string"},"version":{"description":"should match last 'number' in []RevisionHistory","type":"string"}},"type":"object"},"advisory.TrackingID":{"properties":{"system_name":{"type":"string"},"text":{"type":"string"}},"type":"object"},"advisory.TraneTechnology":{"properties":{"brand":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"product":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TrendMicro":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"scores":{"type":"string"},"severity":{"type":"string"},"solution":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.TriageNotes":{"properties":{"references":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.Trustwave":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USD":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.USOMAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"effect_tr":{"type":"string"},"general_information_tr":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"solution_tr":{"type":"string"},"title_tr":{"type":"string"},"trid":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Ubiquiti":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"links":{"items":{"type":"string"},"type":"array","uniqueItems":false},"products":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.UbuntuCVE":{"properties":{"affected_packages":{"items":{"$ref":"#/components/schemas/advisory.AffectedUbuntuPackage"},"type":"array","uniqueItems":false},"cve":{"description":"Candidate","items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"PublicDate","type":"string"},"reference_urls":{"description":"References","items":{"type":"string"},"type":"array","uniqueItems":false},"source_url":{"type":"string"},"status":{"description":"active || retired","type":"string"},"ubuntu_url":{"type":"string"},"usn":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.UbuntuPackageReleaseStatus":{"properties":{"affected":{"type":"boolean"},"fixed":{"type":"boolean"},"fixed_version":{"type":"string"},"lts":{"type":"boolean"},"release":{"type":"string"},"release_long":{"type":"string"},"release_version":{"type":"string"},"status":{"type":"string"}},"type":"object"},"advisory.Unify":{"properties":{"advisory_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Unisoc":{"properties":{"access_vector":{"type":"string"},"affected_chipsets":{"type":"string"},"affected_software":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"rating":{"type":"string"},"score":{"type":"string"},"severity":{"type":"string"},"technology":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Update":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/components/schemas/advisory.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.Package"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/advisory.Reference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/components/schemas/advisory.DateTime"}},"type":"object"},"advisory.Updated":{"type":"object"},"advisory.V3AcceptanceLevel":{"properties":{"description":{"type":"string"},"lastModified":{"type":"string"}},"type":"object"},"advisory.VCCPEDictionary":{"properties":{"baseCPE":{"type":"string"},"versions":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.VCVulnerableCPEs":{"properties":{"cve":{"type":"string"},"unrolled":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.VDEAdvisory":{"properties":{"csaf_json":{"$ref":"#/components/schemas/advisory.CSAF"},"csaf_url":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"vde":{"type":"string"}},"type":"object"},"advisory.VLC":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VMWareAdvisory":{"properties":{"AdvisoryID":{"type":"string"},"AdvisoryURL":{"type":"string"},"CVSSv3Range":{"type":"string"},"IssueDate":{"type":"string"},"Severity":{"type":"string"},"Synopsis":{"type":"string"},"UpdatedOn":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"updated_at":{"type":"string"}},"type":"object"},"advisory.VYAIREAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VanDyke":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VapidLabsAdvisory":{"properties":{"author":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"exploit":{"type":"string"},"link":{"type":"string"},"title":{"type":"string"},"vapidId":{"type":"string"},"vendor":{"type":"string"},"vulnerability":{"type":"string"}},"type":"object"},"advisory.Veeam":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"details":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"solution":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VendorNameForThreatActor":{"properties":{"threat_actor_name":{"type":"string"},"url":{"type":"string"},"vendor_name":{"type":"string"}},"type":"object"},"advisory.VendorProduct":{"properties":{"product":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.VendorRef":{"properties":{"vendor_ref":{"type":"string"},"vendor_ref_url":{"type":"string"}},"type":"object"},"advisory.Veritas":{"properties":{"bulletin_id":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Virtuozzo":{"properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VoidSec":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheck":{"properties":{"affecting":{"items":{"type":"string"},"type":"array","uniqueItems":false},"credit":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"cvss_v3_vector":{"type":"string"},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckCVEListV5":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.MitreCVEListV5Ref"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.VulnCheckConfig":{"properties":{"config":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"}},"type":"object"},"advisory.VulnCheckKEV":{"properties":{"_timestamp":{"type":"string"},"cisa_date_added":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwes":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"dueDate":{"type":"string"},"knownRansomwareCampaignUse":{"type":"string"},"product":{"type":"string"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"required_action":{"type":"string"},"shortDescription":{"type":"string"},"vendorProject":{"type":"string"},"vulncheck_reported_exploitation":{"items":{"$ref":"#/components/schemas/advisory.ReportedExploit"},"type":"array","uniqueItems":false},"vulncheck_xdb":{"items":{"$ref":"#/components/schemas/advisory.XDB"},"type":"array","uniqueItems":false},"vulnerabilityName":{"type":"string"}},"type":"object"},"advisory.VulnCheckPackage":{"properties":{"arch":{"type":"string"},"distro":{"type":"string"},"filename":{"type":"string"},"md5":{"type":"string"},"name":{"type":"string"},"purl":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.VulnerableDebianPackage":{"properties":{"associated_cves":{"items":{"$ref":"#/components/schemas/advisory.DebianCVE"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"package_name":{"type":"string"}},"type":"object"},"advisory.VulnerableProduct":{"properties":{"name":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.Vulnrichment":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"mitre_ref":{"$ref":"#/components/schemas/advisory.VulnrichmentCVERef"},"url":{"type":"string"}},"type":"object"},"advisory.VulnrichmentCVERef":{"properties":{"containers":{"$ref":"#/components/schemas/advisory.VulnrichmentContainers"},"cveMetadata":{"$ref":"#/components/schemas/advisory.MCveMetadata"},"dataType":{"type":"string"},"dataVersion":{"type":"string"}},"type":"object"},"advisory.VulnrichmentContainers":{"properties":{"adp":{"items":{"$ref":"#/components/schemas/advisory.ADP"},"type":"array","uniqueItems":false},"cna":{"$ref":"#/components/schemas/advisory.MCna"}},"type":"object"},"advisory.VulnrichmentContent":{"properties":{"id":{"type":"string"},"options":{"items":{"$ref":"#/components/schemas/advisory.VulnrichmentOption"},"type":"array","uniqueItems":false},"role":{"type":"string"},"timestamp":{"type":"string"},"version":{"type":"string"}},"type":"object"},"advisory.VulnrichmentMetric":{"properties":{"other":{"$ref":"#/components/schemas/advisory.VulnrichmentOther"}},"type":"object"},"advisory.VulnrichmentOption":{"properties":{"Automatable":{"type":"string"},"Exploitation":{"type":"string"},"Technical Impact":{"type":"string"}},"type":"object"},"advisory.VulnrichmentOther":{"properties":{"content":{"$ref":"#/components/schemas/advisory.VulnrichmentContent"},"type":{"type":"string"}},"type":"object"},"advisory.WRT":{"properties":{"advisory":{"type":"string"},"affectedVersions":{"type":"string"},"credits":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"mitigations":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"requirements":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WatchGuard":{"properties":{"advisory_id":{"type":"string"},"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"resolution":{"type":"string"},"score":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WhatsApp":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wibu":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Wireshark":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"id":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WithSecure":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.WolfSSL":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"fixed_version":{"type":"string"},"severity":{"type":"string"}},"type":"object"},"advisory.Wolfi":{"properties":{"apkurl":{"type":"string"},"archs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"description":"un-used","type":"string"},"packages":{"items":{"$ref":"#/components/schemas/advisory.WolfiPackage"},"type":"array","uniqueItems":false},"reponame":{"type":"string"},"urlprefix":{"type":"string"}},"type":"object"},"advisory.WolfiPackage":{"properties":{"name":{"type":"string"},"secfixes":{"items":{"$ref":"#/components/schemas/advisory.WolfiSecFix"},"type":"array","uniqueItems":false}},"type":"object"},"advisory.WolfiSecFix":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"}},"type":"object"},"advisory.Wordfence":{"properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"fixed":{"items":{"type":"string"},"type":"array","uniqueItems":false},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.XDB":{"properties":{"clone_ssh_url":{"type":"string"},"date_added":{"type":"string"},"exploit_type":{"type":"string"},"xdb_id":{"type":"string"},"xdb_url":{"type":"string"}},"type":"object"},"advisory.Xen":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updatedAt":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xerox":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xiaomi":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"internal_id":{"type":"string"},"summary":{"type":"string"},"summary_cn":{"type":"string"},"title":{"type":"string"},"title_cn":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.Xylem":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"references":{"items":{"type":"string"},"type":"array","uniqueItems":false},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"xsa":{"type":"string"}},"type":"object"},"advisory.Yamaha":{"properties":{"affected":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"fixed":{"type":"string"},"summary_ja":{"type":"string"},"title_ja":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.YokogawaAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cwe":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"date_last_revised":{"type":"string"},"name":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"ysar_id":{"type":"string"}},"type":"object"},"advisory.Yubico":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"id":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZDI":{"properties":{"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"cvss_version":{"type":"string"},"discoverers":{"items":{"type":"string"},"type":"array","uniqueItems":false},"filter_ids_dv":{"items":{"type":"string"},"type":"array","uniqueItems":false},"last_updated_at":{"type":"string"},"products":{"items":{"$ref":"#/components/schemas/advisory.ZDIProduct"},"type":"array","uniqueItems":false},"public_advisory":{"type":"string"},"published_date":{"type":"string"},"responses":{"items":{"$ref":"#/components/schemas/advisory.ZDIResponse"},"type":"array","uniqueItems":false},"title":{"type":"string"},"zdi_can":{"type":"string"},"zdi_public":{"type":"string"}},"type":"object"},"advisory.ZDIProduct":{"properties":{"name":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/components/schemas/advisory.ZDIVendor"}},"type":"object"},"advisory.ZDIResponse":{"properties":{"text":{"type":"string"},"uri":{"type":"string"},"vendor":{"$ref":"#/components/schemas/advisory.ZDIResponseVendor"}},"type":"object"},"advisory.ZDIResponseVendor":{"properties":{"name":{"type":"string"}},"type":"object"},"advisory.ZDIVendor":{"properties":{"name":{"type":"string"},"uri":{"type":"string"}},"type":"object"},"advisory.Zebra":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZeroDayAdvisory":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zdi":{"$ref":"#/components/schemas/advisory.ZDI"}},"type":"object"},"advisory.ZeroScienceAdvisory":{"properties":{"advisoryId":{"type":"string"},"affectedVersions":{"type":"string"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"impact":{"type":"string"},"link":{"type":"string"},"poC":{"type":"string"},"references":{"items":{"type":"string"},"type":"array"},"risk":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"vendor":{"type":"string"}},"type":"object"},"advisory.Zimbra":{"properties":{"bugs":{"items":{"type":"integer"},"type":"array"},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"fix":{"type":"string"},"rating":{"type":"string"},"reporter":{"type":"string"},"summary":{"type":"string"}},"type":"object"},"advisory.Zoom":{"properties":{"affected":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss_score":{"type":"string"},"cvss_vector":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"updated_at":{"type":"string"},"url":{"type":"string"},"zsb":{"type":"string"}},"type":"object"},"advisory.Zscaler":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"advisory.ZuluVersion":{"properties":{"jdk":{"type":"string"},"type":{"type":"string"},"zulu":{"type":"string"}},"type":"object"},"advisory.Zuso":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"cvss":{"type":"string"},"date_added":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"},"zaid":{"type":"string"}},"type":"object"},"advisory.Zyxel":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"summary":{"type":"string"},"title":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.BaseMetricV2":{"properties":{"acInsufInfo":{"type":"boolean"},"cvssV2":{"$ref":"#/components/schemas/api.CVSSV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"severity":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.BaseMetricV3":{"properties":{"cvssV3":{"$ref":"#/components/schemas/api.CVSSV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"}},"type":"object"},"api.CPE":{"properties":{"edition":{"type":"string"},"language":{"type":"string"},"other":{"type":"string"},"part":{"type":"string"},"product":{"type":"string"},"sw_edition":{"type":"string"},"target_hw":{"type":"string"},"target_sw":{"type":"string"},"update":{"type":"string"},"vendor":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CPEMatch":{"properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"cpe_name":{"items":{"$ref":"#/components/schemas/api.CPEName"},"type":"array","uniqueItems":false},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"},"vulnerable":{"type":"boolean"}},"type":"object"},"api.CPEName":{"properties":{"cpe22Uri":{"type":"string"},"cpe23Uri":{"type":"string"},"lastModifiedDate":{"type":"string"}},"type":"object"},"api.CVE":{"properties":{"CVE_data_meta":{"$ref":"#/components/schemas/api.CVEDataMeta"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/components/schemas/api.Description"},"problemtype":{"$ref":"#/components/schemas/api.ProblemType"},"references":{"$ref":"#/components/schemas/api.References"}},"type":"object"},"api.CVEDataMeta":{"properties":{"ASSIGNER":{"type":"string"},"ID":{"type":"string"}},"type":"object"},"api.CVEDataMetaExtended":{"properties":{"ALIAS":{"type":"string"},"ASSIGNER":{"type":"string"},"ID":{"type":"string"},"STATUS":{"type":"string"}},"type":"object"},"api.CVEExtended":{"properties":{"CVE_data_meta":{"$ref":"#/components/schemas/api.CVEDataMetaExtended"},"categorization":{"$ref":"#/components/schemas/api.CategorizationExtended"},"data_format":{"type":"string"},"data_type":{"type":"string"},"data_version":{"type":"string"},"description":{"$ref":"#/components/schemas/api.Description"},"problemtype":{"$ref":"#/components/schemas/api.ProblemTypeExtended"},"references":{"$ref":"#/components/schemas/api.ReferencesExtended"}},"type":"object"},"api.CVSSV2":{"properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CVSSV3":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"integrityImpact":{"type":"string"},"privilegesRequired":{"type":"string"},"scope":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.CWE":{"properties":{"abstraction":{"type":"string"},"description":{"type":"string"},"kev_count":{"type":"integer"},"status":{"type":"string"},"structure":{"type":"string"},"vulncheck_nvd_count":{"type":"integer"},"weakness_id":{"type":"string"},"weakness_name":{"type":"string"},"weighted_score":{"type":"number"}},"type":"object"},"api.CategorizationExtended":{"properties":{"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.ClientFingerprints":{"properties":{"hassh":{"type":"string"},"ja3":{"type":"string"},"ja4":{"type":"string"}},"type":"object"},"api.Configurations":{"properties":{"CVE_data_version":{"type":"string"},"nodes":{"items":{"$ref":"#/components/schemas/api.Nodes"},"type":"array","uniqueItems":false}},"type":"object"},"api.CveItems":{"properties":{"configurations":{"$ref":"#/components/schemas/api.Configurations"},"cve":{"$ref":"#/components/schemas/api.CVE"},"impact":{"$ref":"#/components/schemas/api.Impact"},"lastModifiedDate":{"type":"string"},"publishedDate":{"type":"string"},"vcConfigurations":{"$ref":"#/components/schemas/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.CveItemsExtended":{"properties":{"_timestamp":{"type":"string"},"configurations":{"$ref":"#/components/schemas/api.Configurations"},"cve":{"$ref":"#/components/schemas/api.CVEExtended"},"date_added":{"type":"string"},"documentGenerationDate":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"impact":{"$ref":"#/components/schemas/api.ImpactExtended"},"lastModifiedDate":{"type":"string"},"mitre_attack_techniques":{"items":{"$ref":"#/components/schemas/api.MitreAttackTech"},"type":"array","uniqueItems":false},"publishedDate":{"type":"string"},"related_attack_patterns":{"items":{"$ref":"#/components/schemas/api.RelatedAttackPattern"},"type":"array","uniqueItems":false},"vcConfigurations":{"$ref":"#/components/schemas/api.Configurations"},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vulnerable_cpes":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.DateTime":{"type":"object"},"api.Description":{"properties":{"description_data":{"items":{"$ref":"#/components/schemas/api.DescriptionData"},"type":"array","uniqueItems":false}},"type":"object"},"api.DescriptionData":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.EPSS":{"description":"exclude EPSS from changelog","properties":{"epss_percentile":{"type":"number"},"epss_score":{"type":"number"},"last_modified":{"type":"string"}},"type":"object"},"api.EPSSData":{"properties":{"_timestamp":{"type":"string"},"cve":{"type":"string"},"epss_percentile":{"type":"number"},"epss_score":{"type":"number"}},"type":"object"},"api.ExploitChain":{"properties":{"cves":{"items":{"$ref":"#/components/schemas/api.ExploitChainCVE"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.ExploitChainCVE":{"properties":{"cve":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ExploitV3Result":{"properties":{"_timestamp":{"description":"ignore this field when checking for differences/changes","type":"string"},"commercial_exploit_found":{"type":"boolean"},"counts":{"$ref":"#/components/schemas/api.ExploitsV3Count"},"date_added":{"type":"string"},"epss":{"$ref":"#/components/schemas/api.EPSS"},"exploits":{"items":{"$ref":"#/components/schemas/api.NormalizedExploitV3Entry"},"type":"array","uniqueItems":false},"id":{"type":"string"},"inKEV":{"type":"boolean"},"inVCKEV":{"type":"boolean"},"max_exploit_maturity":{"type":"string"},"public_exploit_found":{"type":"boolean"},"reported_exploitation":{"items":{"$ref":"#/components/schemas/api.NormalizedReportV3Entry"},"type":"array","uniqueItems":false},"reported_exploited":{"type":"boolean"},"reported_exploited_by_botnets":{"type":"boolean"},"reported_exploited_by_honeypot_service":{"type":"boolean"},"reported_exploited_by_ransomware":{"type":"boolean"},"reported_exploited_by_threat_actors":{"type":"boolean"},"reported_exploited_by_vulncheck_canaries":{"type":"boolean"},"timeline":{"$ref":"#/components/schemas/api.ExploitsV3Timeline"},"trending":{"$ref":"#/components/schemas/api.ExploitsTrending"},"weaponized_exploit_found":{"type":"boolean"}},"type":"object"},"api.ExploitsChange":{"properties":{"change_time":{"type":"string"},"change_type":{"type":"string"},"field":{"type":"string"},"new_value":{},"old_value":{}},"type":"object"},"api.ExploitsChangelog":{"properties":{"changes":{"items":{"$ref":"#/components/schemas/api.ExploitsChange"},"type":"array","uniqueItems":false},"cve":{"type":"string"}},"type":"object"},"api.ExploitsTrending":{"properties":{"github":{"type":"boolean"}},"type":"object"},"api.ExploitsV3Count":{"properties":{"botnets":{"type":"integer"},"exploits":{"type":"integer"},"ransomware_families":{"type":"integer"},"threat_actors":{"type":"integer"}},"type":"object"},"api.ExploitsV3Timeline":{"properties":{"cisa_kev_date_added":{"type":"string"},"cisa_kev_date_due":{"type":"string"},"first_exploit_published":{"type":"string"},"first_exploit_published_weaponized_or_higher":{"type":"string"},"first_reported_botnet":{"type":"string"},"first_reported_ransomware":{"type":"string"},"first_reported_threat_actor":{"type":"string"},"most_recent_exploit_published":{"type":"string"},"most_recent_reported_botnet":{"type":"string"},"most_recent_reported_ransomware":{"type":"string"},"most_recent_reported_threat_actor":{"type":"string"},"nvd_last_modified":{"description":"it's often the case the nvd record was updated, but in a way that is irrelevant to the contents\nof a vc exploits record.","type":"string"},"nvd_published":{"type":"string"},"vulncheck_kev_date_added":{"type":"string"},"vulncheck_kev_date_due":{"type":"string"}},"type":"object"},"api.HTTPDetails":{"properties":{"http_request_body":{"type":"string"},"http_user_agent":{"type":"string"},"method":{"type":"string"},"protocol":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.Impact":{"properties":{"baseMetricV2":{"$ref":"#/components/schemas/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"metricV40":{"$ref":"#/components/schemas/advisory.CVSSV40"}},"type":"object"},"api.ImpactExtended":{"properties":{"baseMetricV2":{"$ref":"#/components/schemas/api.BaseMetricV2"},"baseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"correctedBaseMetricV3":{"$ref":"#/components/schemas/api.BaseMetricV3"},"epss":{"$ref":"#/components/schemas/api.EPSS"},"metricV40":{"$ref":"#/components/schemas/advisory.CVSSV40"},"ssvc":{"items":{"$ref":"#/components/schemas/api.SSVC"},"type":"array","uniqueItems":false},"temporalMetricV2":{"$ref":"#/components/schemas/api.TemporalMetricV2"},"temporalMetricV3":{"$ref":"#/components/schemas/api.TemporalMetricV3"},"temporalV3Corrected":{"$ref":"#/components/schemas/api.TemporalMetricV3"},"threatMetricV40":{"$ref":"#/components/schemas/advisory.CVSSV40Threat"}},"type":"object"},"api.InitialAccess":{"properties":{"artifacts":{"description":"Artifacts holds the set of available artifacts for this vulnerability, such as exploit, shodan queries, PCAP traces, and others.","items":{"$ref":"#/components/schemas/api.InitialAccessArtifact"},"type":"array","uniqueItems":false},"cve":{"description":"CVE identifier for the given initial access record.","type":"string"},"inKEV":{"description":"InKEV is true if this artifact is in CISA's Known Exploited Vulnerabilities (KEV) data set; otherwise, false.","type":"boolean"},"inVCKEV":{"description":"InVCKEV is true if this artifact is in VulnCheck's Known Exploited Vulnerabilities (VCKEV) data set; otherwise, false.","type":"boolean"},"vulnerable_cpes":{"description":"VulnerableCPEs is the list of vulnerable CPE strings associated with this CVE and artifact(s).","items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.InitialAccessArtifact":{"properties":{"artifactName":{"description":"ArtifactName is a title to associate with this artifact.","type":"string"},"artifactsURL":{"description":"ArtifactsURL are URLs to the available artifact.","items":{"type":"string"},"type":"array","uniqueItems":false},"baiduQueries":{"description":"...","items":{"type":"string"},"type":"array","uniqueItems":false},"baiduRawQueries":{"description":"...","items":{"type":"string"},"type":"array","uniqueItems":false},"censysLegacyQueries":{"description":"CensysLegacyQueries are legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysLegacyRawQueries":{"description":"CensysLegacyRawQueries are raw legacy queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysQueries":{"description":"CensysQueries are queries for examining potential Internet-exposed devices \u0026 applications with Censys in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"censysRawQueries":{"description":"CensysRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Censys.","items":{"type":"string"},"type":"array","uniqueItems":false},"cloneSSHURL":{"description":"CloneSSHURL is the git URL to clone the artifact with.","type":"string"},"dateAdded":{"description":"DateAdded is when this artifact entry was first added to the InitialAccess data set.","type":"string"},"driftnetQueries":{"description":"DriftnetQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array","uniqueItems":false},"driftnetRawQueries":{"description":"DriftnetRawQueries are queries for examining Internet exposed services with Driftnet.","items":{"type":"string"},"type":"array","uniqueItems":false},"exploit":{"description":"Exploit indicates whether or not an exploit is available in this artifact.","type":"boolean"},"fofaQueries":{"description":"FOFAQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with FOFA.","items":{"type":"string"},"type":"array","uniqueItems":false},"fofaRawQueries":{"items":{"type":"string"},"type":"array","uniqueItems":false},"googleQueries":{"description":"google queries","items":{"type":"string"},"type":"array","uniqueItems":false},"googleRawQueries":{"description":"raw google queries","items":{"type":"string"},"type":"array","uniqueItems":false},"greynoiseQueries":{"description":"GreynoiseQueries are queries for finding the vulnerability via honeypot data.","items":{"type":"string"},"type":"array","uniqueItems":false},"mitreAttackTechniques":{"description":"MITRE ATT\u0026CK techniques","items":{"type":"string"},"type":"array","uniqueItems":false},"nmapScript":{"description":"NmapScript indicates whether or not an nmap script for scanning environment exists in this artifact.","type":"boolean"},"pcap":{"description":"PCAP indicates whether of not a package capture of the exploit PoC exploiting a vulnerable system exists in this artifact.","type":"boolean"},"product":{"description":"Product are the software that has the vulnerability.","items":{"type":"string"},"type":"array","uniqueItems":false},"shodanQueries":{"description":"ShodanQueries are queries for examining potential Internet-exposed devices \u0026 applications with Shodan in URL form.","items":{"type":"string"},"type":"array","uniqueItems":false},"shodanRawQueries":{"description":"ShodanRawQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with Shodan.","items":{"type":"string"},"type":"array","uniqueItems":false},"sigmaRule":{"description":"SigmaRule indicates whether or not a Sigma rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"snortRule":{"description":"SnortRule indicates whether or not a Snort rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"suricataRule":{"description":"SuricataRule indicates whether or not a Suricata rule designed to detect the exploitation of the vulnerability over the network exists in this artifact.","type":"boolean"},"targetDocker":{"description":"TargetDocker indicates whether or not there is an available docker image with the vulnerability.","type":"boolean"},"targetEncryptedComms":{"description":"Encrypted communications?","type":"string"},"targetService":{"description":"TargetService indicates the service (HTTP, FTP, etc) that this exploit targets.","type":"string"},"vendor":{"description":"Vendor of the vulnerable product","type":"string"},"versionScanner":{"description":"VersionScanner indicates whether or not the exploit PoC can determine if target system is vulnerable without sending exploit payload in this artifact.","type":"boolean"},"yara":{"description":"YARA indicates whether or not a YARA rule designed to detect the exploit on an endpoint exists in this artifact.","type":"boolean"},"zeroday":{"description":"Zeroday indicates whether or not it is a VulnCheck zeroday.","type":"boolean"},"zoomEyeQueries":{"description":"ZoomEyeQueries are raw queries for examining potential Internet-exposed devices \u0026 applications with ZoomEye.","items":{"type":"string"},"type":"array","uniqueItems":false},"zoomEyeRawQueries":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"api.MitreAttackTech":{"properties":{"d3fendmapping":{"items":{"$ref":"#/components/schemas/api.MitreMitigation2D3fendMapping"},"type":"array","uniqueItems":false},"detections":{"items":{"$ref":"#/components/schemas/api.MitreDetectionTech"},"type":"array","uniqueItems":false},"domain":{"type":"string"},"id":{"type":"string"},"mitigations":{"items":{"$ref":"#/components/schemas/api.MitreMitigationTech"},"type":"array","uniqueItems":false},"name":{"type":"string"},"subtechnique":{"type":"boolean"},"tactics":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.MitreAttackToCVE":{"properties":{"cve_list":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"technique_id":{"$ref":"#/components/schemas/api.MitreAttackTech"}},"type":"object"},"api.MitreD3fendTechnique":{"properties":{"id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.MitreDetectionTech":{"properties":{"datacomponent":{"type":"string"},"datasource":{"type":"string"},"detects":{"type":"string"},"id":{"type":"string"}},"type":"object"},"api.MitreMitigation2D3fendMapping":{"properties":{"d3fendtechniques":{"items":{"$ref":"#/components/schemas/api.MitreD3fendTechnique"},"type":"array","uniqueItems":false},"id":{"type":"string"}},"type":"object"},"api.MitreMitigationTech":{"properties":{"description":{"type":"string"},"id":{"type":"string"},"mitigation_url":{"type":"string"}},"type":"object"},"api.NVD20CPEMatch":{"properties":{"cpeLastModified":{"type":"string"},"created":{"type":"string"},"criteria":{"type":"string"},"lastModified":{"type":"string"},"matchCriteriaId":{"type":"string"},"matches":{"items":{"$ref":"#/components/schemas/api.NVD20CPEName"},"type":"array","uniqueItems":false},"status":{"type":"string"},"versionEndExcluding":{"type":"string"},"versionEndIncluding":{"type":"string"},"versionStartExcluding":{"type":"string"},"versionStartIncluding":{"type":"string"}},"type":"object"},"api.NVD20CPEName":{"properties":{"cpeName":{"type":"string"},"cpeNameId":{"type":"string"}},"type":"object"},"api.NVD20CVE":{"properties":{"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"descriptions":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/components/schemas/api.NVD20Metric"},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/api.NVD20Reference"},"type":"array","uniqueItems":false},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vendorComments":{"items":{"$ref":"#/components/schemas/api.NVD20VendorComment"},"type":"array","uniqueItems":false},"vulnStatus":{"type":"string"},"weaknesses":{"items":{"$ref":"#/components/schemas/api.NVD20Weakness"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20CVEExtended":{"properties":{"ALIAS":{"type":"string"},"STATUS":{"type":"string"},"_timestamp":{"description":"the deep tag instructs deep.Equal to ignore this field (used during OpenSearch loading)","type":"string"},"categorization":{"$ref":"#/components/schemas/api.CategorizationExtended"},"cisaActionDue":{"type":"string"},"cisaExploitAdd":{"type":"string"},"cisaRequiredAction":{"type":"string"},"cisaVulnerabilityName":{"type":"string"},"configurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"descriptions":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"documentGenerationDate":{"type":"string"},"evaluatorComment":{"type":"string"},"evaluatorImpact":{"type":"string"},"evaluatorSolution":{"type":"string"},"id":{"type":"string"},"lastModified":{"type":"string"},"metrics":{"$ref":"#/components/schemas/api.NVD20MetricExtended"},"mitreAttackTechniques":{"items":{"$ref":"#/components/schemas/api.MitreAttackTech"},"type":"array","uniqueItems":false},"published":{"type":"string"},"references":{"items":{"$ref":"#/components/schemas/api.NVD20ReferenceExtended"},"type":"array","uniqueItems":false},"relatedAttackPatterns":{"items":{"$ref":"#/components/schemas/api.RelatedAttackPattern"},"type":"array","uniqueItems":false},"sourceIdentifier":{"type":"string"},"vcConfigurations":{"items":{"$ref":"#/components/schemas/advisory.NVD20Configuration"},"type":"array","uniqueItems":false},"vcVulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"vendorComments":{"items":{"$ref":"#/components/schemas/api.NVD20VendorComment"},"type":"array","uniqueItems":false},"vulnStatus":{"type":"string"},"vulncheckKEVExploitAdd":{"type":"string"},"vulnerableCPEs":{"items":{"type":"string"},"type":"array","uniqueItems":false},"weaknesses":{"items":{"$ref":"#/components/schemas/api.NVD20WeaknessExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20CvssDataV2":{"properties":{"accessComplexity":{"type":"string"},"accessVector":{"type":"string"},"authentication":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"collateralDamagePotential":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"exploitability":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"targetDistribution":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssDataV3":{"properties":{"attackComplexity":{"type":"string"},"attackVector":{"type":"string"},"availabilityImpact":{"type":"string"},"availabilityRequirement":{"type":"string"},"baseScore":{"type":"number"},"baseSeverity":{"type":"string"},"confidentialityImpact":{"type":"string"},"confidentialityRequirement":{"type":"string"},"environmentalScore":{"type":"number"},"environmentalSeverity":{"type":"string"},"exploitCodeMaturity":{"type":"string"},"integrityImpact":{"type":"string"},"integrityRequirement":{"type":"string"},"modifiedAttackComplexity":{"type":"string"},"modifiedAttackVector":{"type":"string"},"modifiedAvailabilityImpact":{"type":"string"},"modifiedConfidentialityImpact":{"type":"string"},"modifiedIntegrityImpact":{"type":"string"},"modifiedPrivilegesRequired":{"type":"string"},"modifiedScope":{"type":"string"},"modifiedUserInteraction":{"type":"string"},"privilegesRequired":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"scope":{"type":"string"},"temporalScore":{"type":"number"},"temporalSeverity":{"type":"string"},"userInteraction":{"type":"string"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV2":{"properties":{"acInsufInfo":{"type":"boolean"},"baseSeverity":{"type":"string"},"cvssData":{"$ref":"#/components/schemas/api.NVD20CvssDataV2"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"obtainAllPrivilege":{"type":"boolean"},"obtainOtherPrivilege":{"type":"boolean"},"obtainUserPrivilege":{"type":"boolean"},"source":{"type":"string"},"type":{"type":"string"},"userInteractionRequired":{"type":"boolean"}},"type":"object"},"api.NVD20CvssMetricV3":{"properties":{"cvssData":{"$ref":"#/components/schemas/api.NVD20CvssDataV3"},"exploitabilityScore":{"type":"number"},"impactScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20CvssMetricV40":{"properties":{"cvssData":{"$ref":"#/components/schemas/advisory.CVSSV40"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20Description":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20Metric":{"properties":{"cvssMetricV2":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV2"},"type":"array","uniqueItems":false},"cvssMetricV30":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV31":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV40":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV40"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20MetricExtended":{"properties":{"cvssMetricV2":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV2"},"type":"array","uniqueItems":false},"cvssMetricV30":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV31":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV3"},"type":"array","uniqueItems":false},"cvssMetricV40":{"items":{"$ref":"#/components/schemas/api.NVD20CvssMetricV40"},"type":"array","uniqueItems":false},"epss":{"$ref":"#/components/schemas/api.EPSS"},"ssvc":{"items":{"$ref":"#/components/schemas/api.SSVC"},"type":"array","uniqueItems":false},"temporalCVSSV2":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV2"},"temporalCVSSV2Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV2"},"type":"array","uniqueItems":false},"temporalCVSSV30":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"temporalCVSSV30Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"type":"array","uniqueItems":false},"temporalCVSSV31":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"temporalCVSSV31Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20TemporalCVSSV3"},"type":"array","uniqueItems":false},"threatCVSSV40":{"$ref":"#/components/schemas/api.NVD20ThreatCVSSV40"},"threatCVSSV40Secondary":{"items":{"$ref":"#/components/schemas/api.NVD20ThreatCVSSV40"},"type":"array","uniqueItems":false}},"type":"object"},"api.NVD20Reference":{"properties":{"source":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.NVD20ReferenceExtended":{"properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"source":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.NVD20TemporalAssociatedBaseMetric":{"properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV2":{"properties":{"associatedBaseMetricV2":{"$ref":"#/components/schemas/api.NVD20TemporalAssociatedBaseMetric"},"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20TemporalCVSSV3":{"properties":{"associatedBaseMetricV3":{"$ref":"#/components/schemas/api.NVD20TemporalAssociatedBaseMetric"},"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.NVD20ThreatAssociatedBaseMetric":{"properties":{"baseScore":{"type":"number"},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20ThreatCVSSV40":{"properties":{"associatedBaseMetricV40":{"$ref":"#/components/schemas/api.NVD20ThreatAssociatedBaseMetric"},"baseThreatScore":{"type":"number"},"baseThreatSeverity":{"type":"string"},"exploitMaturity":{"type":"string"}},"type":"object"},"api.NVD20VendorComment":{"properties":{"comment":{"type":"string"},"lastModified":{"type":"string"},"organization":{"type":"string"}},"type":"object"},"api.NVD20Weakness":{"properties":{"description":{"items":{"$ref":"#/components/schemas/api.NVD20Description"},"type":"array","uniqueItems":false},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.NVD20WeaknessDescExtended":{"properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.NVD20WeaknessExtended":{"properties":{"description":{"items":{"$ref":"#/components/schemas/api.NVD20WeaknessDescExtended"},"type":"array","uniqueItems":false},"source":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.Nodes":{"properties":{"children":{"items":{"$ref":"#/components/schemas/api.Nodes"},"type":"array","uniqueItems":false},"cpe_match":{"items":{"$ref":"#/components/schemas/api.CPEMatch"},"type":"array","uniqueItems":false},"operator":{"type":"string"}},"type":"object"},"api.NormalizedExploitV3Entry":{"properties":{"clone_ssh_url":{"type":"string"},"clone_ssh_url_cached":{"type":"string"},"date_added":{"type":"string"},"exploit_availability":{"type":"string"},"exploit_maturity":{"type":"string"},"exploit_type":{"type":"string"},"name":{"type":"string"},"reference_url":{"type":"string"},"refsource":{"type":"string"},"repo_id":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.NormalizedReportV3Entry":{"properties":{"date_added":{"type":"string"},"name":{"type":"string"},"refsource":{"type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackage":{"properties":{"artifacts":{"$ref":"#/components/schemas/api.OSSPackageArtifacts"},"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"licenses":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array","uniqueItems":false},"research_attributes":{"$ref":"#/components/schemas/api.OSSPackageResearchAttributes"},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"api.OSSPackageArtifacts":{"properties":{"binary":{"items":{"$ref":"#/components/schemas/api.OSSPackageDownloadInfo"},"type":"array","uniqueItems":false},"source":{"items":{"$ref":"#/components/schemas/api.OSSPackageDownloadInfo"},"type":"array","uniqueItems":false}},"type":"object"},"api.OSSPackageDownloadInfo":{"properties":{"hashes":{"items":{"$ref":"#/components/schemas/api.OSSPackageHashInfo"},"type":"array","uniqueItems":false},"reference":{"type":"string"},"type":{"description":"See OSSPackageDownloadInfoType* consts","type":"string"},"url":{"type":"string"}},"type":"object"},"api.OSSPackageHashInfo":{"properties":{"algorithm":{"description":"See OSSPackageHashInfoAlgo* consts","type":"string"},"type":{"description":"See OSSPackageHashInfoType* consts","type":"string"},"value":{"description":"hex string digest or link to hash","type":"string"}},"type":"object"},"api.OSSPackageResearchAttributes":{"properties":{"abandoned":{"type":"boolean"},"eol":{"type":"boolean"},"is_malicious":{"type":"boolean"},"malicious_source":{"type":"string"},"repo_hijackable":{"type":"boolean"},"squatted_package":{"type":"string"}},"type":"object"},"api.OSSPackageVulnerability":{"properties":{"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"api.Package":{"properties":{"filename":{"type":"string"},"name":{"description":"sort","type":"string"},"release":{"type":"string"},"src":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.ProblemType":{"properties":{"problemtype_data":{"items":{"$ref":"#/components/schemas/api.ProblemTypeData"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeData":{"properties":{"description":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDescription"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeDataExtended":{"properties":{"description":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDescriptionExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.ProblemTypeDescription":{"properties":{"lang":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeDescriptionExtended":{"properties":{"lang":{"type":"string"},"name":{"type":"string"},"url":{"type":"string"},"value":{"type":"string"}},"type":"object"},"api.ProblemTypeExtended":{"properties":{"problemtype_data":{"items":{"$ref":"#/components/schemas/api.ProblemTypeDataExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.Reference":{"properties":{"href":{"description":"sort","type":"string"},"id":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"}},"type":"object"},"api.ReferenceData":{"properties":{"name":{"type":"string"},"refsource":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.ReferenceDataExtended":{"properties":{"date_added":{"type":"string"},"external_id":{"type":"string"},"lang":{"type":"string"},"name":{"type":"string"},"previous_url":{"type":"string"},"refsource":{"type":"string"},"status":{"type":"string"},"tags":{"items":{"type":"string"},"type":"array","uniqueItems":false},"url":{"type":"string"}},"type":"object"},"api.References":{"properties":{"reference_data":{"items":{"$ref":"#/components/schemas/api.ReferenceData"},"type":"array","uniqueItems":false}},"type":"object"},"api.ReferencesExtended":{"properties":{"reference_data":{"description":"ExploitData []NormalizedExploit `json:\"exploit_data,omitempty\"`\n\t\tThreatActorData []ThreatActorExtended `json:\"threat_actor_data,omitempty\"`\n\t\tRansomwareData []RansomwareReferenceData `json:\"ransomware_data,omitempty\"`\n\t\tAdvisoryData []AdvisoryExtended `json:\"advisory_data,omitempty\"`\n\t\tIdentifierData []IdentifierExtended `json:\"identifier_data,omitempty\"`","items":{"$ref":"#/components/schemas/api.ReferenceDataExtended"},"type":"array","uniqueItems":false}},"type":"object"},"api.RelatedAttackPattern":{"properties":{"capec_id":{"type":"string"},"capec_name":{"type":"string"},"capec_url":{"type":"string"},"lang":{"type":"string"}},"type":"object"},"api.SSVC":{"properties":{"automatable":{"type":"string"},"exploitation":{"type":"string"},"source":{"type":"string"},"technicalImpact":{"type":"string"}},"type":"object"},"api.TemporalCVSSV2":{"properties":{"exploitability":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalCVSSV3":{"properties":{"exploitCodeMaturity":{"type":"string"},"remediationLevel":{"type":"string"},"reportConfidence":{"type":"string"},"temporalScore":{"type":"number"},"vectorString":{"type":"string"},"version":{"type":"string"}},"type":"object"},"api.TemporalMetricV2":{"properties":{"cvssV2":{"$ref":"#/components/schemas/api.TemporalCVSSV2"}},"type":"object"},"api.TemporalMetricV3":{"properties":{"cvssV3":{"$ref":"#/components/schemas/api.TemporalCVSSV3"}},"type":"object"},"api.Update":{"properties":{"cve":{"items":{"type":"string"},"type":"array","uniqueItems":false},"date_added":{"type":"string"},"description":{"type":"string"},"id":{"description":"sort // key","type":"string"},"issued":{"$ref":"#/components/schemas/api.DateTime"},"os_arch":{"type":"string"},"os_version":{"type":"string"},"packages":{"items":{"$ref":"#/components/schemas/api.Package"},"type":"array","uniqueItems":false},"references":{"items":{"$ref":"#/components/schemas/api.Reference"},"type":"array","uniqueItems":false},"severity":{"type":"string"},"title":{"type":"string"},"type":{"type":"string"},"updated":{"$ref":"#/components/schemas/api.DateTime"}},"type":"object"},"api.VulnCheckCanary":{"properties":{"category":{"type":"string"},"client_fingerprints":{"$ref":"#/components/schemas/api.ClientFingerprints"},"cve":{"type":"string"},"dst_country":{"type":"string"},"http":{"$ref":"#/components/schemas/api.HTTPDetails"},"payload":{"type":"string"},"severity":{"type":"integer"},"signature":{"type":"string"},"signature_id":{"type":"integer"},"src_country":{"type":"string"},"src_ip":{"type":"string"},"src_port":{"type":"integer"},"timestamp":{"type":"string"}},"type":"object"},"api.VulnerabilityAlias":{"properties":{"alias":{"type":"string"},"cve":{"type":"string"},"reference_url":{"type":"string"}},"type":"object"},"models.Entitlements":{"properties":{"entitlements":{"additionalProperties":{"items":{"type":"string"},"type":"array"},"description":"Entitlements provides a map of roles to a list of entitlements","type":"object"}},"type":"object"},"paginate.Match":{"properties":{"field":{"type":"string"},"value":{"type":"string"}},"type":"object"},"paginate.Pagination":{"properties":{"cursor":{"description":"Cursor for the current page","type":"string"},"first_item":{"description":"First and last Item","type":"integer"},"index":{"description":"The requested index","type":"string"},"last_item":{"type":"integer"},"limit":{"description":"Per-Page limit","type":"integer"},"matches":{"items":{"$ref":"#/components/schemas/paginate.Match"},"type":"array","uniqueItems":false},"max_pages":{"type":"integer"},"next_cursor":{"description":"Cursor for the next page","type":"string"},"opensearch_query":{"type":"object"},"order":{"type":"string"},"page":{"description":"The current Page number","type":"integer"},"pages":{"items":{"type":"string"},"type":"array","uniqueItems":false},"parameters":{"items":{"$ref":"#/components/schemas/paginate.Param"},"type":"array","uniqueItems":false},"show_pages":{"type":"boolean"},"show_query":{"type":"boolean"},"sort":{"type":"string"},"timestamp":{"type":"string"},"total_documents":{"description":"The total number of items","type":"integer"},"total_pages":{"description":"The total number of pages","type":"integer"},"warnings":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"paginate.Param":{"properties":{"filtering":{"type":"string"},"format":{"type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexBackup":{"properties":{"date_added":{"type":"string"},"filename":{"type":"string"},"sha256":{"type":"string"},"url":{"type":"string"},"url_ap-southeast-2":{"type":"string"},"url_eu-west-2":{"type":"string"},"url_expires":{"type":"string"},"url_il-central-1":{"type":"string"},"url_me-central-1":{"type":"string"},"url_mrap":{"type":"string"},"url_ttl_minutes":{"type":"integer"},"url_us-east-1":{"type":"string"},"url_us-west-2":{"type":"string"}},"type":"object"},"params.IndexBackupList":{"properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed backup information","type":"string"},"name":{"type":"string"}},"type":"object"},"params.IndexList":{"properties":{"description":{"type":"string"},"href":{"description":"Href API endpoint URI to detailed index information","type":"string"},"name":{"type":"string"}},"type":"object"},"purl.BatchVulnFinding":{"properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array","uniqueItems":false},"purl":{"description":"the purl, ex. hex/coherence@0.1.2","type":"string"},"purl_struct":{"$ref":"#/components/schemas/purl.PackageURLJSON"},"research_attributes":{"$ref":"#/components/schemas/api.OSSPackageResearchAttributes"},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"purl.PackageURLJSON":{"description":"meta-data about the purl","properties":{"name":{"type":"string"},"namespace":{"type":"string"},"qualifiers":{"items":{"$ref":"#/components/schemas/purl.QualifierJSON"},"type":"array","uniqueItems":false},"subpath":{"type":"string"},"type":{"type":"string"},"version":{"type":"string"}},"type":"object"},"purl.QualifierJSON":{"properties":{"key":{"type":"string"},"value":{"type":"string"}},"type":"object"},"purls.Artifact":{"type":"object"},"purls.PurlResponse":{"properties":{"artifacts":{"$ref":"#/components/schemas/purls.Artifact"},"cves":{"items":{"type":"string"},"type":"array","uniqueItems":false},"licenses":{"items":{"type":"string"},"type":"array","uniqueItems":false},"name":{"type":"string"},"published_date":{"type":"string"},"purl":{"items":{"type":"string"},"type":"array","uniqueItems":false},"version":{"type":"string"},"vulnerabilities":{"items":{"$ref":"#/components/schemas/purls.Vulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"purls.Vulnerability":{"properties":{"arch":{"type":"string"},"detection":{"type":"string"},"fixed_version":{"type":"string"}},"type":"object"},"render.Response-array_params_IndexBackupList":{"properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/components/schemas/params.IndexBackupList"},"type":"array","uniqueItems":false}},"type":"object"},"render.Response-array_params_IndexList":{"properties":{"_benchmark":{"type":"number"},"data":{"items":{"$ref":"#/components/schemas/params.IndexList"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.A10"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ABBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AIX"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AMD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AMI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ASRG"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AVEVAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AVIDMLAdvs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AWS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Abbott"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Absolute"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Acronis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AdobeAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Advantech"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Advisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AdvisoryRecord"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlephResearch"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Alibaba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlmaLinuxUpdate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AlpineLinuxSecDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AmazonCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AnchoreNVDOverride"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AndroidAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheActiveMQ"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheArchiva"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheArrow"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCamel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCommons"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheCouchDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheFlink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheGuacamole"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheHTTP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheHadoop"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheJSPWiki"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheKafka"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheLoggingServices"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheNiFi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOFBiz"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOpenMeetings"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheOpenOffice"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApachePulsar"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheShiro"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSpark"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheStruts"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSubversion"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheSuperset"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheTomcat"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ApacheZooKeeper"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AppCheck"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Appgate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AppleAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ArchIssue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Arista"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Aruba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AssetNote"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Asterisk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Astra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Asus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AtlassianAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AtlassianVuln"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Atredis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Audiocodes"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.AusCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Autodesk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Avaya"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Avigilon"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Axis"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Azul"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BBraunAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BDUAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Bandr"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BaxterAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeckhoffAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeckmanCoulter"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BectonDickinsonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeldenAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BeyondTrust"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Binarly"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BitDefender"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BlackBerry"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BoschAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.BostonScientificAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Botnet"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CACyberCentreAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CBLMariner"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CERTEUAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CESA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CISAAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNNVDEntryJSON"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNVDBulletin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CNVDFlaw"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CanvasExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CarestreamAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Carrier"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertBE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertFRAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertIN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertIRSecurityAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertSE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CertUA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ChainGuard"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CheckPoint"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Chrome"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ciena"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CisaCsafAdv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CiscoKnownGoodValue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CitrixAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ClarotyVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CloudBees"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CloudVulnDBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CodesysAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CommVault"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CompassSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ContainerOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CoreImpactExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Crestron"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.CrowdSec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Curl"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Cvrf"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DFNCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DNN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dahua"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Danfoss"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dassault"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DebianSecurityAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Dell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DeltaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DistroPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Django"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DotCMS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.DragosAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Draytek"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Drupal"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLAlibaba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLMicrosoft"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EOLReleaseData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EUVD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EatonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Elastic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Elspec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EmergingThreatsSnort"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EmersonAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.EndOfLife"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Endress"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ExodusIntel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ExploitDBExploitv2"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.F5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FSecure"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fanuc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fastly"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Festo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FileCloud"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FileZilla"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FlattSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ForgeRock"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FortinetAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.FortinetIPS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Foxit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Fresenius"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GCP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GEGas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GEHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GHAdvisoryJSONLean"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GHSA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GMOCyberSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gallagher"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gen"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Genetec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Gigabyte"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitHubExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitLabExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GiteeExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GitlabAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Glibc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GnuTLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GoVulnJSON"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Grafana"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.GreyNoiseDetection"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HCL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HIKVision"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HKCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HMS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HPE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Hacktivity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HarmonyOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HashiCorp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HaskellSADBAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HillromAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Hitachi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HitachiEnergy"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Honeywell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Huawei"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HuaweiEulerOS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.HuaweiIPS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IAVA"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IBM"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ITWExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Idemia"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Igel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IncibeAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Intel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IpIntelRecord"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IsraeliAlert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IsraeliVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Istio"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ivanti"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.IvantiRSS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JFrog"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JNJAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JVN"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JVNAdvisoryItem"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Jenkins"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JetBrains"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.JohnsonControls"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Juniper"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.K8S"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KEVCatalogVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KRCertAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KasperskyICSCERTAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.KoreLogic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Kunbus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LG"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Lantronix"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Lenovo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LexmarkAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LibreOffice"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Linux"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.LolAdvs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MACert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MFiles"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MaliciousPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ManageEngineAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MbedTLS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.McAfee"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mediatek"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MedtronicAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mendix"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetaAdvisories"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetaData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MetasploitExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftCVRF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftDriverBlockList"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MicrosoftKb"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mikrotik"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mindray"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MispValue"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Mitel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitreCVEListV5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MitsubishiElectricAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MongoDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MoxaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.MozillaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NCSC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NCSCCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NEC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NHS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NTP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NVD20Source"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NVDCPEDictionary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NZAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Naver"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nessus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NetApp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netatalk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netgate"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netgear"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Netskope"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nexpose"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NginxAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NodeJS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NodeSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nokia"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.NotePadPlusPlus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nozomi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Nuclei"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OSV"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OTRS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OctopusDeploy"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Okta"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Omron"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OneE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenBSD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenCVDB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenJDK"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenSSH"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenSSLSecAdv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OpenStack"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Opengear"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OracleCPU"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OracleCPUCSAF"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.OwnCloud"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PHPMyAdmin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PKCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PTC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PacketstormExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Palantir"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PaloAltoAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Panasonic"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PaperCut"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Pega"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PhilipsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PhoenixContactAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PostgresSQL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PowerDNS"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Progress"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Proofpoint"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PureStorage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.PyPAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QNAPAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QQID"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QSB"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Qualcomm"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Qualys"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.QualysQID"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RansomwareExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RedLion"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RedhatCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Renesas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Revive"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RhelCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Roche"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Rockwell"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RockyErrata"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Rsync"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ruckus"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.RustsecAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SAAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SAP"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SECConsult"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SSDAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Safran"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SaintExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SalesForce"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Samba"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sandisk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SansDshield"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SchneiderElectricAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Schutzwerk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SecurityBulletin"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SecurityLab"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SeebugExploit"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SentinelOne"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ServiceNow"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SevenZip"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ShadowServerExploitedVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Shielder"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sick"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SiemensAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SierraWireless"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SigmaRule"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SingCert"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sitecore"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Slackware"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SolarWindsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Solr"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sonatype"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SonicWallAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SpacelabsHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Splunk"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Spring"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Stormshield"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.StrykerAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Sudo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SuseSecurity"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SwisslogHealthcareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Symfony"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Synacktiv"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.SyncroSoft"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Synology"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Syss"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TI"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TPLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TWCertAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tailscale"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TalosAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TeamViewer"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TenableResearchAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tencent"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Thales"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TheMissingLink"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ThermoFisher"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ThreatActorWithExternalObjects"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Tibco"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TraneTechnology"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.TrendMicro"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Trustwave"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.USD"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.USOMAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Ubiquiti"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.UbuntuCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Unify"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Unisoc"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Update"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VCCPEDictionary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VCVulnerableCPEs"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VDEAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VLC"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VMWareAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VYAIREAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VanDyke"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VapidLabsAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Veeam"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Veritas"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Virtuozzo"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VoidSec"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheck"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckCVEListV5"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckConfig"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnCheckKEV"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.VulnerableDebianPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Vulnrichment"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WRT"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WatchGuard"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WhatsApp"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wibu"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wireshark"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WithSecure"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.WolfSSL"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wolfi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Wordfence"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xen"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xerox"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xiaomi"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Xylem"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Yamaha"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.YokogawaAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Yubico"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zebra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ZeroDayAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.ZeroScienceAdvisory"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zimbra"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zoom"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zscaler"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zuso"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/advisory.Zyxel"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CWE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CWE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CveItems"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.CveItemsExtended"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.EPSSData"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitChain"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitV3Result"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.ExploitsChangelog"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.InitialAccess"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.MitreAttackToCVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CPEMatch"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CVE"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.NVD20CVEExtended"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.OSSPackage"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_Update-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.Update"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.VulnCheckCanary"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/api.VulnerabilityAlias"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/paginate.Pagination"},"data":{"items":{"$ref":"#/components/schemas/purls.PurlResponse"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.ResponseMetadata"},"data":{"items":{"type":"string"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.BackupResponseMetadata"},"data":{"items":{"$ref":"#/components/schemas/params.IndexBackup"},"type":"array","uniqueItems":false}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.PurlResponseMetadata"},"data":{"$ref":"#/components/schemas/v3controllers.PurlResponseData"}},"type":"object"},"render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata":{"properties":{"_benchmark":{"type":"number"},"_meta":{"$ref":"#/components/schemas/v3controllers.PurlsResponseMetadata"},"data":{"items":{"$ref":"#/components/schemas/purl.BatchVulnFinding"},"type":"array","uniqueItems":false}},"type":"object"},"v3controllers.BackupResponseMetadata":{"properties":{"index":{"type":"string"},"timestamp":{"type":"string"}},"type":"object"},"v3controllers.PurlResponseData":{"properties":{"cves":{"description":"list of associated CVE 's","items":{"type":"string"},"type":"array","uniqueItems":false},"vulnerabilities":{"description":"list of associated vulnerabilities","items":{"$ref":"#/components/schemas/api.OSSPackageVulnerability"},"type":"array","uniqueItems":false}},"type":"object"},"v3controllers.PurlResponseMetadata":{"properties":{"purl_struct":{"$ref":"#/components/schemas/purl.PackageURLJSON"},"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.PurlsResponseMetadata":{"properties":{"timestamp":{"description":"time of the transaction","type":"string"},"total_documents":{"description":"number of results found","type":"integer"}},"type":"object"},"v3controllers.ResponseMetadata":{"properties":{"cpe":{"type":"string"},"cpe_struct":{"$ref":"#/components/schemas/api.CPE"},"timestamp":{"type":"string"},"total_documents":{"type":"integer"}},"type":"object"}},"securitySchemes":{"Bearer":{"in":"header","name":"Authorization","type":"apiKey"}}},"externalDocs":{"description":"","url":""},"info":{"contact":{"email":"support@vulncheck.com","name":"VulnCheck API Support"},"description":"Version 3 of the VulnCheck API","termsOfService":"https://vulncheck.com/terms","title":"VulnCheck API","version":"3.0"},"openapi":"3.1.0","paths":{"/backup":{"get":{"description":"Return a list of indexes with backup and endpoint links that the user has access to","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.Response-array_params_IndexBackupList"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"oneOf":[{"type":"string"},{"type":"string"}]}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return a list of indexes with backup and endpoint links","tags":["endpoints"]}},"/backup/{index}":{"get":{"description":"Retrieve a list of VulnCheck backups by index","parameters":[{"description":"Name of an exploit, vulnerability, or advisory index","in":"path","name":"index","required":true,"schema":{"enum":["7zip","a10","abb","abbott","absolute","acronis","adobe","advantech","advisories","aix","aleph-research","alibaba-advs","alma","alpine","alpine-purls","amazon","amazon-cve","amd","ami","anchore-nvd-override","android","apache-activemq","apache-archiva","apache-arrow","apache-camel","apache-commons","apache-couchdb","apache-flink","apache-guacamole","apache-hadoop","apache-http","apache-jspwiki","apache-kafka","apache-loggingservices","apache-nifi","apache-ofbiz","apache-openmeetings","apache-openoffice","apache-pulsar","apache-shiro","apache-spark","apache-struts","apache-subversion","apache-superset","apache-tomcat","apache-zookeeper","appcheck","appgate","apple","arch","arista","aruba","asrg","assetnote","asterisk","astra","asus","atlassian","atlassian-vulns","atredis","audiocodes","auscert","autodesk","avaya","aveva","avidml-advs","avigilon","aws","axis","azul","bandr","baxter","bbraun","bd","bdu","beckhoff","beckman-coulter","belden","beyond-trust","binarly","bitdefender","blackberry","bls","bosch","boston-scientific","botnets","ca-cyber-centre","canvas","carestream","cargo","carrier","cbl-mariner","centos","cert-be","cert-in","cert-ir-security-alerts","cert-se","cert-ua","certeu","certfr","chainguard","checkpoint","chrome","ciena","cisa-alerts","cisa-csaf","cisa-kev","cisco","cisco-csaf","cisco-known-good-values","cisco-talos","citrix","claroty","cloudbees","cloudvulndb","cnnvd","cnvd-bulletins","cnvd-flaws","cocoapods","codesys","commvault","compass-security","composer","conan","coreimpact","cpe-vulnerable","crestron","crowdsec","curl","cwe","dahua","danfoss","dassault","debian","debian-dsa","debian-packages","debian-purls","dell","delta","dfn-cert","django","dlink","dnn","dotcms","dragos","draytek","drupal","eaton","elastic","elspec","emerging-threats-snort","emerson","endoflife","endress","eol","eol-alibaba","eol-microsoft","epss","euvd","exodus-intel","exploit-chains","exploitdb","exploits","exploits-changelog","f-secure","f5","fanuc","fastly","fedora","festo","filecloud","filezilla","flatt-security","forgerock","fortinet","fortinet-ips","foxit","freebsd","fresenius","gallagher","gcp","ge-gas","ge-healthcare","gem","gen","genetec","ghsa","gigabyte","gitee-exploits","github-exploits","github-security-advisories","gitlab-advisories-community","gitlab-exploits","glibc","gmo-cybersecurity","gnutls","go-vulndb","golang","google-0day-itw","google-container-optimized-os","grafana","greynoise-metadata","hackage","hacktivity","harmonyos","hashicorp","haskell-sadb","hcl","hex","hikvision","hillrom","hitachi","hitachi-energy","hkcert","hms","honeywell","hp","hpe","huawei-euleros","huawei-ips","huawei-psirt","iava","ibm","idemia","igel","il-alerts","il-vulnerabilities","incibe","initial-access","initial-access-git","intel","ipintel-10d","ipintel-30d","ipintel-3d","ipintel-90d","istio","ivanti","ivanti-rss","jenkins","jetbrains","jfrog","jnj","johnson-controls","juniper","jvn","jvndb","kaspersky-ics-cert","korelogic","krcert-security-notices","krcert-vulnerabilities","kubernetes","kunbus","lantronix","lenovo","lexmark","lg","libre-office","linux","lol-advs","m-files","macert","malicious-packages","manageengine","maven","mbed-tls","mcafee","mediatek","medtronic","mendix","meta-advisories","metasploit","microsoft-csaf","microsoft-cvrf","microsoft-driver-block-list","microsoft-kb","mikrotik","mindray","misp-threat-actors","mitel","mitre-attack-cve","mitre-cvelist-v5","mitsubishi-electric","mongodb","moxa","mozilla","naver","ncsc","ncsc-cves","nec","nessus","netapp","netatalk","netgate","netgear","netskope","nexpose","nginx","nhs","ni","nist-nvd","nist-nvd2","nist-nvd2-cpematch","nist-nvd2-sources","node-security","nodejs","nokia","notepadplusplus","nozomi","npm","ntp","nuclei","nuget","nvd-cpe-dictionary","nvidia","nz-advisories","octopus-deploy","okta","omron","one-e","opam","open-cvdb","openbsd","opengear","openjdk","openssh","openssl-secadv","openstack","openwrt","oracle","oracle-cpu","oracle-cpu-csaf","osv","otrs","owncloud","packetstorm","palantir","palo-alto","panasonic","papercut","pega","philips","phoenix-contact","php-my-admin","pkcert","postgressql","powerdns","progress","proofpoint","ptc","pub","pure-storage","pypa-advisories","pypi","qnap","qqids","qualcomm","qualys","qualys-qids","qubes-qsb","ransomware","red-lion","redhat","redhat-cves","renesas","revive","roche","rockwell","rocky","rocky-errata","rocky-purls","rsync","ruckus","rustsec-advisories","sacert","safran","saint","salesforce","samba","sandisk","sans-dshield","sap","schneider-electric","schutzwerk","sec-consult","securitylab","seebug","sel","sentinelone","servicenow","shadowserver-exploited","shielder","sick","siemens","sierra-wireless","sigmahq-sigma-rules","singcert","sitecore","slackware","solarwinds","solr","sonatype","sonicwall","spacelabs-healthcare","splunk","spring","ssd","stormshield","stryker","sudo","suse","suse-security","swift","swisslog-healthcare","symfony","synacktiv","syncrosoft","synology","syss","tailscale","teamviewer","tenable-research-advisories","tencent","thales","themissinglink","thermo-fisher","threat-actors","ti","tibco","tp-link","trane-technology","trendmicro","trustwave","twcert","ubiquiti","ubuntu","ubuntu-purls","unify","unisoc","usd","usom","vandyke","vapidlabs","vc-cpe-dictionary","vde","veeam","veritas","virtuozzo","vlc","vmware","voidsec","vulncheck","vulncheck-canaries","vulncheck-canaries-10d","vulncheck-canaries-30d","vulncheck-canaries-3d","vulncheck-canaries-90d","vulncheck-config","vulncheck-cvelist-v5","vulncheck-kev","vulncheck-nvd","vulncheck-nvd2","vulnerability-aliases","vulnrichment","vyaire","watchguard","whatsapp","wibu","wireshark","with-secure","wolfi","wolfssl","wordfence","xen","xerox","xiaomi","xylem","yamaha","yokogawa","yubico","zdi","zebra","zeroscience","zimbra","zoom","zscaler","zuso","zyxel"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_BackupResponseData-v3controllers_BackupResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Retrieve a list of backups by index","tags":["endpoints"]}},"/cpe":{"get":{"description":"Based on the specified CPE (Common Platform Enumeration) URI string, this endpoint will return a list of vulnerabilities that are related to the package. We support v2.2 and v2.3","parameters":[{"description":"CPE designation to lookup","in":"query","name":"cpe","required":true,"schema":{"type":"string"}},{"description":"Filter by vulnerability status (true/false). Defaults to false if not provided.","in":"query","name":"isVulnerable","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_string-v3controllers_ResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return CVE 's associated with a specific NIST CPE","tags":["endpoints"]}},"/entitlements":{"get":{"description":"Retrieve entitlements for the current user","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/models.Entitlements"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Retrieve user entitlements","tags":["endpoints"]}},"/index":{"get":{"description":"Return a list of available indexes with endpoint links that the user has access to","responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.Response-array_params_IndexList"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"oneOf":[{"type":"string"},{"type":"string"}]}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return a list of available indexes with endpoint links","tags":["endpoints"]}},"/index/7zip":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the 7zip index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 7Zip Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/7zip?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/7zip?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SevenZip-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"7zip\"","tags":["indices"]}},"/index/a10":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the a10 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** A10 Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/a10?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/a10?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_A10-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"a10\"","tags":["indices"]}},"/index/abb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ABB Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ABBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"abb\"","tags":["indices"]}},"/index/abbott":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the abbott index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Abbott Product Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/abbott?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/abbott?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Abbott-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"abbott\"","tags":["indices"]}},"/index/absolute":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the absolute index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Absolute Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/absolute?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/absolute?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Absolute-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"absolute\"","tags":["indices"]}},"/index/acronis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the acronis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Acronis Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/acronis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/acronis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Acronis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"acronis\"","tags":["indices"]}},"/index/adobe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the adobe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Adobe Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/adobe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/adobe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AdobeAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"adobe\"","tags":["indices"]}},"/index/advantech":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advantech index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Advantech Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advantech?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advantech?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Advantech-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"advantech\"","tags":["indices"]}},"/index/advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AdvisoryRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"advisories\"","tags":["indices"]}},"/index/aix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AIX Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AIX-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aix\"","tags":["indices"]}},"/index/aleph-research":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aleph-research index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aleph Research Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aleph-research?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aleph-research?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlephResearch-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aleph-research\"","tags":["indices"]}},"/index/alibaba-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alibaba-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alibaba-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alibaba-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Alibaba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alibaba-advs\"","tags":["indices"]}},"/index/alma":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alma index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alma Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alma?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alma?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlmaLinuxUpdate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alma\"","tags":["indices"]}},"/index/alpine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AlpineLinuxSecDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alpine\"","tags":["indices"]}},"/index/alpine-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the alpine-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alpine Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/alpine-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/alpine-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"alpine-purls\"","tags":["indices"]}},"/index/amazon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon Linux Security Center\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"amazon\"","tags":["indices"]}},"/index/amazon-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amazon-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Amazon CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amazon-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amazon-cve?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AmazonCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"amazon-cve\"","tags":["indices"]}},"/index/amd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the amd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMD Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/amd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/amd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AMD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"amd\"","tags":["indices"]}},"/index/ami":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ami index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AMI Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ami?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ami?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AMI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ami\"","tags":["indices"]}},"/index/anchore-nvd-override":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the anchore-nvd-override index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Anchore NVD Data Overrides\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/anchore-nvd-override?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/anchore-nvd-override?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AnchoreNVDOverride-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"anchore-nvd-override\"","tags":["indices"]}},"/index/android":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the android index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Android Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/android?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/android?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AndroidAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"android\"","tags":["indices"]}},"/index/apache-activemq":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-activemq index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ActiveMQ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-activemq?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-activemq?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheActiveMQ-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-activemq\"","tags":["indices"]}},"/index/apache-archiva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-archiva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Archiva Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-archiva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-archiva?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheArchiva-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-archiva\"","tags":["indices"]}},"/index/apache-arrow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-arrow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Arrow Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-arrow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-arrow?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheArrow-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-arrow\"","tags":["indices"]}},"/index/apache-camel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-camel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Camel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-camel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-camel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCamel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-camel\"","tags":["indices"]}},"/index/apache-commons":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-commons index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Commons Known Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-commons?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-commons?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCommons-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-commons\"","tags":["indices"]}},"/index/apache-couchdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-couchdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache CouchDB Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-couchdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-couchdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheCouchDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-couchdb\"","tags":["indices"]}},"/index/apache-flink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-flink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Flink Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-flink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-flink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheFlink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-flink\"","tags":["indices"]}},"/index/apache-guacamole":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-guacamole index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Guacamole Security Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-guacamole?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-guacamole?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheGuacamole-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-guacamole\"","tags":["indices"]}},"/index/apache-hadoop":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-hadoop index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Hadoop CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-hadoop?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-hadoop?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheHadoop-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-hadoop\"","tags":["indices"]}},"/index/apache-http":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-http index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache HTTP Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-http?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-http?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheHTTP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-http\"","tags":["indices"]}},"/index/apache-jspwiki":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-jspwiki index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache JSPWiki CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-jspwiki?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-jspwiki?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheJSPWiki-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-jspwiki\"","tags":["indices"]}},"/index/apache-kafka":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-kafka index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Kafka Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-kafka?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-kafka?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheKafka-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-kafka\"","tags":["indices"]}},"/index/apache-loggingservices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-loggingservices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Logging Services Known Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-loggingservices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-loggingservices?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheLoggingServices-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-loggingservices\"","tags":["indices"]}},"/index/apache-nifi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-nifi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache NiFi Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-nifi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-nifi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheNiFi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-nifi\"","tags":["indices"]}},"/index/apache-ofbiz":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-ofbiz index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OFBiz Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-ofbiz?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-ofbiz?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOFBiz-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-ofbiz\"","tags":["indices"]}},"/index/apache-openmeetings":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openmeetings index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenMeetings Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openmeetings?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openmeetings?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOpenMeetings-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-openmeetings\"","tags":["indices"]}},"/index/apache-openoffice":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-openoffice index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache OpenOffice Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-openoffice?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-openoffice?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheOpenOffice-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-openoffice\"","tags":["indices"]}},"/index/apache-pulsar":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-pulsar index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Pulsar Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-pulsar?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-pulsar?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApachePulsar-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-pulsar\"","tags":["indices"]}},"/index/apache-shiro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-shiro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Shiro Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-shiro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-shiro?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheShiro-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-shiro\"","tags":["indices"]}},"/index/apache-spark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-spark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Spark Known Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-spark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-spark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSpark-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-spark\"","tags":["indices"]}},"/index/apache-struts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-struts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Struts Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-struts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-struts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheStruts-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-struts\"","tags":["indices"]}},"/index/apache-subversion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-subversion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Subversion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-subversion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-subversion?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSubversion-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-subversion\"","tags":["indices"]}},"/index/apache-superset":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-superset index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Superset CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-superset?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-superset?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheSuperset-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-superset\"","tags":["indices"]}},"/index/apache-tomcat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-tomcat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache Tomcat Security Vunlnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-tomcat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-tomcat?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheTomcat-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-tomcat\"","tags":["indices"]}},"/index/apache-zookeeper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apache-zookeeper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apache ZooKeeper Vulnerability Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apache-zookeeper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apache-zookeeper?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ApacheZooKeeper-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apache-zookeeper\"","tags":["indices"]}},"/index/appcheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appcheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AppCheck Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appcheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appcheck?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AppCheck-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"appcheck\"","tags":["indices"]}},"/index/appgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the appgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Appgate SDP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/appgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/appgate?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Appgate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"appgate\"","tags":["indices"]}},"/index/apple":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the apple index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Apple Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/apple?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/apple?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AppleAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"apple\"","tags":["indices"]}},"/index/arch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arch Linux\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ArchIssue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"arch\"","tags":["indices"]}},"/index/arista":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the arista index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Arista Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/arista?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/arista?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Arista-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"arista\"","tags":["indices"]}},"/index/aruba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aruba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Aruba Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aruba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aruba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Aruba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aruba\"","tags":["indices"]}},"/index/asrg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asrg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASRG Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asrg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asrg?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ASRG-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"asrg\"","tags":["indices"]}},"/index/assetnote":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the assetnote index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AssetNote Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/assetnote?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/assetnote?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AssetNote-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"assetnote\"","tags":["indices"]}},"/index/asterisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asterisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Asterisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asterisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asterisk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Asterisk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"asterisk\"","tags":["indices"]}},"/index/astra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the astra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Astra Linux Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/astra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/astra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Astra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"astra\"","tags":["indices"]}},"/index/asus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the asus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ASUSTek Computer Inc.\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/asus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/asus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Asus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"asus\"","tags":["indices"]}},"/index/atlassian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AtlassianAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"atlassian\"","tags":["indices"]}},"/index/atlassian-vulns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atlassian-vulns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atlassian Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atlassian-vulns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atlassian-vulns?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AtlassianVuln-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"atlassian-vulns\"","tags":["indices"]}},"/index/atredis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the atredis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Atredis Partners Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/atredis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/atredis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Atredis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"atredis\"","tags":["indices"]}},"/index/audiocodes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the audiocodes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AudioCodes Product Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/audiocodes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/audiocodes?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Audiocodes-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"audiocodes\"","tags":["indices"]}},"/index/auscert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the auscert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AusCERT Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/auscert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/auscert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AusCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"auscert\"","tags":["indices"]}},"/index/autodesk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the autodesk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Autodesk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/autodesk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/autodesk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Autodesk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"autodesk\"","tags":["indices"]}},"/index/avaya":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avaya index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avaya Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avaya?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avaya?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Avaya-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"avaya\"","tags":["indices"]}},"/index/aveva":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aveva index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AVEVA Group Limited\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aveva?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aveva?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AVEVAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aveva\"","tags":["indices"]}},"/index/avidml-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avidml-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AI Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avidml-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avidml-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AVIDMLAdvs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"avidml-advs\"","tags":["indices"]}},"/index/avigilon":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the avigilon index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Avigilon Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/avigilon?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/avigilon?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Avigilon-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"avigilon\"","tags":["indices"]}},"/index/aws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the aws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** AWS Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/aws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/aws?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_AWS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"aws\"","tags":["indices"]}},"/index/axis":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the axis index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Axis OS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/axis?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/axis?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Axis-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"axis\"","tags":["indices"]}},"/index/azul":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the azul index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Azul Common Vulnerabilities and Exposures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/azul?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/azul?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Azul-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"azul\"","tags":["indices"]}},"/index/bandr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bandr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B\u0026R Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bandr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bandr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Bandr-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bandr\"","tags":["indices"]}},"/index/baxter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the baxter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Baxter Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/baxter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/baxter?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BaxterAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"baxter\"","tags":["indices"]}},"/index/bbraun":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bbraun index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** B. Braun Medical Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bbraun?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bbraun?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BBraunAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bbraun\"","tags":["indices"]}},"/index/bd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Becton Dickinson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BectonDickinsonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bd\"","tags":["indices"]}},"/index/bdu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bdu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BDU Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bdu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bdu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BDUAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bdu\"","tags":["indices"]}},"/index/beckhoff":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckhoff index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckhoff Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckhoff?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckhoff?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeckhoffAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"beckhoff\"","tags":["indices"]}},"/index/beckman-coulter":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beckman-coulter index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beckman Coulter Product Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beckman-coulter?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beckman-coulter?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeckmanCoulter-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"beckman-coulter\"","tags":["indices"]}},"/index/belden":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the belden index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Belden Security Bulletins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/belden?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/belden?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeldenAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"belden\"","tags":["indices"]}},"/index/beyond-trust":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the beyond-trust index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Beyond Trust Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/beyond-trust?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/beyond-trust?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BeyondTrust-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"beyond-trust\"","tags":["indices"]}},"/index/binarly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the binarly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Binarly Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/binarly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/binarly?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Binarly-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"binarly\"","tags":["indices"]}},"/index/bitdefender":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bitdefender index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bitdefender Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bitdefender?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bitdefender?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BitDefender-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bitdefender\"","tags":["indices"]}},"/index/blackberry":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the blackberry index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** BlackBerry Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/blackberry?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/blackberry?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BlackBerry-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"blackberry\"","tags":["indices"]}},"/index/bls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Black Lantern Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bls\"","tags":["indices"]}},"/index/bosch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the bosch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Bosch Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/bosch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/bosch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BoschAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"bosch\"","tags":["indices"]}},"/index/boston-scientific":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the boston-scientific index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Boston Scientific Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/boston-scientific?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/boston-scientific?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_BostonScientificAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"boston-scientific\"","tags":["indices"]}},"/index/botnets":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the botnets index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Botnets\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/botnets?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/botnets?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Botnet-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"botnets\"","tags":["indices"]}},"/index/ca-cyber-centre":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ca-cyber-centre index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Canadian Centre for Cyber Security Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ca-cyber-centre?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ca-cyber-centre?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CACyberCentreAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ca-cyber-centre\"","tags":["indices"]}},"/index/canvas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the canvas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CANVAS Exploit Packs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/canvas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/canvas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CanvasExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"canvas\"","tags":["indices"]}},"/index/carestream":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carestream index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carestream Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carestream?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carestream?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CarestreamAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"carestream\"","tags":["indices"]}},"/index/cargo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cargo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cargo (Rust) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cargo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cargo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cargo\"","tags":["indices"]}},"/index/carrier":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the carrier index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Carrier Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/carrier?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/carrier?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Carrier-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"carrier\"","tags":["indices"]}},"/index/cbl-mariner":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cbl-mariner index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CBL-Mariner Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cbl-mariner?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cbl-mariner?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CBLMariner-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cbl-mariner\"","tags":["indices"]}},"/index/centos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the centos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CentOS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/centos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/centos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CESA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"centos\"","tags":["indices"]}},"/index/cert-be":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-be index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert BE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-be?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-be?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertBE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-be\"","tags":["indices"]}},"/index/cert-in":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-in index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT IN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-in?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-in?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertIN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-in\"","tags":["indices"]}},"/index/cert-ir-security-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ir-security-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert IR Security Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ir-security-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ir-security-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertIRSecurityAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-ir-security-alerts\"","tags":["indices"]}},"/index/cert-se":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-se index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert SE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-se?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-se?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertSE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-se\"","tags":["indices"]}},"/index/cert-ua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cert-ua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert UA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cert-ua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cert-ua?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertUA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cert-ua\"","tags":["indices"]}},"/index/certeu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certeu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT-EU The Computer Emergency Response Team for the EU Institutions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certeu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certeu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CERTEUAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"certeu\"","tags":["indices"]}},"/index/certfr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the certfr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cert FR Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/certfr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/certfr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CertFRAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"certfr\"","tags":["indices"]}},"/index/chainguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chainguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ChainGuard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chainguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chainguard?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ChainGuard-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"chainguard\"","tags":["indices"]}},"/index/checkpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the checkpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CheckPoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/checkpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/checkpoint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CheckPoint-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"checkpoint\"","tags":["indices"]}},"/index/chrome":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the chrome index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Google Chrome Release Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/chrome?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/chrome?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Chrome-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"chrome\"","tags":["indices"]}},"/index/ciena":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ciena index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ciena\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ciena?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ciena?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ciena-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ciena\"","tags":["indices"]}},"/index/cisa-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CISAAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisa-alerts\"","tags":["indices"]}},"/index/cisa-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Security Advisories - CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CisaCsafAdv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisa-csaf\"","tags":["indices"]}},"/index/cisa-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisa-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA KEV (Known Exploited Vulnerabilities)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisa-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisa-kev?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KEVCatalogVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisa-kev\"","tags":["indices"]}},"/index/cisco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco\"","tags":["indices"]}},"/index/cisco-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco-csaf\"","tags":["indices"]}},"/index/cisco-known-good-values":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-known-good-values index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Known Good Values\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-known-good-values?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-known-good-values?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CiscoKnownGoodValue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco-known-good-values\"","tags":["indices"]}},"/index/cisco-talos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cisco-talos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Cisco Talos Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cisco-talos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cisco-talos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TalosAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cisco-talos\"","tags":["indices"]}},"/index/citrix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the citrix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Citrix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/citrix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/citrix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CitrixAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"citrix\"","tags":["indices"]}},"/index/claroty":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the claroty index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Team 82: The Claroty Research Team\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/claroty?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/claroty?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ClarotyVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"claroty\"","tags":["indices"]}},"/index/cloudbees":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudbees index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudBees Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudbees?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudbees?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CloudBees-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cloudbees\"","tags":["indices"]}},"/index/cloudvulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cloudvulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CloudVulnDB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cloudvulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cloudvulndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CloudVulnDBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cloudvulndb\"","tags":["indices"]}},"/index/cnnvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnnvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Chinese National Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnnvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnnvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNNVDEntryJSON-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cnnvd\"","tags":["indices"]}},"/index/cnvd-bulletins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-bulletins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-bulletins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-bulletins?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNVDBulletin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cnvd-bulletins\"","tags":["indices"]}},"/index/cnvd-flaws":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cnvd-flaws index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CNVD Flaws\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cnvd-flaws?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cnvd-flaws?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CNVDFlaw-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cnvd-flaws\"","tags":["indices"]}},"/index/cocoapods":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cocoapods index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CocoaPods packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cocoapods?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cocoapods?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cocoapods\"","tags":["indices"]}},"/index/codesys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the codesys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Codesys Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/codesys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/codesys?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CodesysAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"codesys\"","tags":["indices"]}},"/index/commvault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the commvault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Commvault Cloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/commvault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/commvault?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CommVault-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"commvault\"","tags":["indices"]}},"/index/compass-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the compass-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Compass Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/compass-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/compass-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CompassSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"compass-security\"","tags":["indices"]}},"/index/composer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the composer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PHP Composer packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/composer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/composer?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"composer\"","tags":["indices"]}},"/index/conan":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the conan index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** C/C++ packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/conan?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/conan?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"conan\"","tags":["indices"]}},"/index/coreimpact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the coreimpact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Core Impact\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/coreimpact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/coreimpact?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CoreImpactExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"coreimpact\"","tags":["indices"]}},"/index/cpe-vulnerable":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cpe-vulnerable index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unrolled VulnCheck CPEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cpe-vulnerable?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cpe-vulnerable?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VCVulnerableCPEs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cpe-vulnerable\"","tags":["indices"]}},"/index/crestron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crestron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Crestron Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crestron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crestron?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Crestron-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"crestron\"","tags":["indices"]}},"/index/crowdsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the crowdsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CrowdSec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/crowdsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/crowdsec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_CrowdSec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"crowdsec\"","tags":["indices"]}},"/index/curl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the curl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Curl CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/curl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/curl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Curl-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"curl\"","tags":["indices"]}},"/index/cwe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the cwe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Common Weakness Enumeration Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/cwe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/cwe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CWE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"cwe\"","tags":["indices"]}},"/index/dahua":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dahua index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dahua Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dahua?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dahua?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dahua-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dahua\"","tags":["indices"]}},"/index/danfoss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the danfoss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Danfoss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/danfoss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/danfoss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Danfoss-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"danfoss\"","tags":["indices"]}},"/index/dassault":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dassault index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dassault Systèmes Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dassault?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dassault?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dassault-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dassault\"","tags":["indices"]}},"/index/debian":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnerableDebianPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian\"","tags":["indices"]}},"/index/debian-dsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-dsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-dsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-dsa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DebianSecurityAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian-dsa\"","tags":["indices"]}},"/index/debian-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-packages?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DistroPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian-packages\"","tags":["indices"]}},"/index/debian-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the debian-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Debian PURLs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/debian-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/debian-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"debian-purls\"","tags":["indices"]}},"/index/dell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dell Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Dell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dell\"","tags":["indices"]}},"/index/delta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the delta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Delta Controls Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/delta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/delta?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DeltaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"delta\"","tags":["indices"]}},"/index/dfn-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dfn-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DFN-CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dfn-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dfn-cert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DFNCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dfn-cert\"","tags":["indices"]}},"/index/django":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the django index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Django Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/django?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/django?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Django-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"django\"","tags":["indices"]}},"/index/dlink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dlink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DLink Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dlink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dlink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dlink\"","tags":["indices"]}},"/index/dnn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dnn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DNN Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dnn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dnn?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DNN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dnn\"","tags":["indices"]}},"/index/dotcms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dotcms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DotCMS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dotcms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dotcms?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DotCMS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dotcms\"","tags":["indices"]}},"/index/dragos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the dragos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Dragos Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/dragos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/dragos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_DragosAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"dragos\"","tags":["indices"]}},"/index/draytek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the draytek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** DrayTek Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/draytek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/draytek?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Draytek-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"draytek\"","tags":["indices"]}},"/index/drupal":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the drupal index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Drupal Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/drupal?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/drupal?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Drupal-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"drupal\"","tags":["indices"]}},"/index/eaton":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eaton index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Eaton Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eaton?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eaton?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EatonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eaton\"","tags":["indices"]}},"/index/elastic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elastic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elastic Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elastic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elastic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Elastic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"elastic\"","tags":["indices"]}},"/index/elspec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the elspec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Elspec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/elspec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/elspec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Elspec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"elspec\"","tags":["indices"]}},"/index/emerging-threats-snort":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerging-threats-snort index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerging Threats Snort\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerging-threats-snort?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerging-threats-snort?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EmergingThreatsSnort-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"emerging-threats-snort\"","tags":["indices"]}},"/index/emerson":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the emerson index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Emerson Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/emerson?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/emerson?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EmersonAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"emerson\"","tags":["indices"]}},"/index/endoflife":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endoflife index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** End Of Life\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endoflife?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endoflife?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EndOfLife-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"endoflife\"","tags":["indices"]}},"/index/endress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the endress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Endress \u0026 Hauser Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/endress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/endress?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Endress-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"endress\"","tags":["indices"]}},"/index/eol":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck EOL Coverage\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLReleaseData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eol\"","tags":["indices"]}},"/index/eol-alibaba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-alibaba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Alibaba EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-alibaba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-alibaba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLAlibaba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eol-alibaba\"","tags":["indices"]}},"/index/eol-microsoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the eol-microsoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft EOL\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/eol-microsoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/eol-microsoft?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EOLMicrosoft-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"eol-microsoft\"","tags":["indices"]}},"/index/epss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the epss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** EPSS Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/epss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/epss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_EPSSData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"epss\"","tags":["indices"]}},"/index/euvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the euvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** European Union Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/euvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/euvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_EUVD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"euvd\"","tags":["indices"]}},"/index/exodus-intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exodus-intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Exodus Intelligence Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exodus-intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exodus-intel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ExodusIntel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exodus-intel\"","tags":["indices"]}},"/index/exploit-chains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploit-chains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Chains\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploit-chains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploit-chains?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitChain-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploit-chains\"","tags":["indices"]}},"/index/exploitdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploitdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Exploit Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploitdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploitdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ExploitDBExploitv2-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploitdb\"","tags":["indices"]}},"/index/exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Exploit Intelligence Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitV3Result-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploits\"","tags":["indices"]}},"/index/exploits-changelog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the exploits-changelog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Changelog for VC Exploits Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/exploits-changelog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/exploits-changelog?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_ExploitsChangelog-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"exploits-changelog\"","tags":["indices"]}},"/index/f-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F-Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f-secure?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FSecure-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"f-secure\"","tags":["indices"]}},"/index/f5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the f5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** F5 Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/f5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/f5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_F5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"f5\"","tags":["indices"]}},"/index/fanuc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fanuc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fanuc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fanuc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fanuc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fanuc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fanuc\"","tags":["indices"]}},"/index/fastly":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fastly index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fastly Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fastly?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fastly?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fastly-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fastly\"","tags":["indices"]}},"/index/fedora":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fedora index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fedora Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fedora?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fedora?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fedora\"","tags":["indices"]}},"/index/festo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the festo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Festo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/festo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/festo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Festo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"festo\"","tags":["indices"]}},"/index/filecloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filecloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filecloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filecloud?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FileCloud-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"filecloud\"","tags":["indices"]}},"/index/filezilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the filezilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FileZilla Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/filezilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/filezilla?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FileZilla-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"filezilla\"","tags":["indices"]}},"/index/flatt-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the flatt-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Flatt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/flatt-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/flatt-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FlattSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"flatt-security\"","tags":["indices"]}},"/index/forgerock":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the forgerock index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ForgeRock Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/forgerock?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/forgerock?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ForgeRock-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"forgerock\"","tags":["indices"]}},"/index/fortinet":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FortiGuard Fortinet\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FortinetAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fortinet\"","tags":["indices"]}},"/index/fortinet-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fortinet-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fortinet Labs Threat Encyclopedia\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fortinet-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fortinet-ips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_FortinetIPS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fortinet-ips\"","tags":["indices"]}},"/index/foxit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the foxit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Foxit Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/foxit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/foxit?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Foxit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"foxit\"","tags":["indices"]}},"/index/freebsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the freebsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** FreeBSD Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/freebsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/freebsd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Advisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"freebsd\"","tags":["indices"]}},"/index/fresenius":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the fresenius index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Fresenius Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/fresenius?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/fresenius?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Fresenius-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"fresenius\"","tags":["indices"]}},"/index/gallagher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gallagher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gallagher Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gallagher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gallagher?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gallagher-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gallagher\"","tags":["indices"]}},"/index/gcp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gcp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GCP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gcp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gcp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GCP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gcp\"","tags":["indices"]}},"/index/ge-gas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-gas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Gas Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-gas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-gas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GEGas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ge-gas\"","tags":["indices"]}},"/index/ge-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ge-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GE Healthcare Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ge-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ge-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GEHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ge-healthcare\"","tags":["indices"]}},"/index/gem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruby (gem) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gem?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gem\"","tags":["indices"]}},"/index/gen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gen Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gen?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gen-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gen\"","tags":["indices"]}},"/index/genetec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the genetec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Genetec Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/genetec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/genetec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Genetec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"genetec\"","tags":["indices"]}},"/index/ghsa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ghsa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GHSA\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ghsa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ghsa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GHSA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ghsa\"","tags":["indices"]}},"/index/gigabyte":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gigabyte index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GIGABYTE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gigabyte?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gigabyte?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Gigabyte-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gigabyte\"","tags":["indices"]}},"/index/gitee-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitee-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gitee Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitee-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitee-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GiteeExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gitee-exploits\"","tags":["indices"]}},"/index/github-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitHub Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitHubExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"github-exploits\"","tags":["indices"]}},"/index/github-security-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the github-security-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Github Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/github-security-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/github-security-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GHAdvisoryJSONLean-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"github-security-advisories\"","tags":["indices"]}},"/index/gitlab-advisories-community":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-advisories-community index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Advisory Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-advisories-community?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-advisories-community?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitlabAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gitlab-advisories-community\"","tags":["indices"]}},"/index/gitlab-exploits":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gitlab-exploits index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GitLab Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gitlab-exploits?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gitlab-exploits?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GitLabExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gitlab-exploits\"","tags":["indices"]}},"/index/glibc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the glibc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Glibc Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/glibc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/glibc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Glibc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"glibc\"","tags":["indices"]}},"/index/gmo-cybersecurity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gmo-cybersecurity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GMO Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gmo-cybersecurity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gmo-cybersecurity?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GMOCyberSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gmo-cybersecurity\"","tags":["indices"]}},"/index/gnutls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the gnutls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GnuTLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/gnutls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/gnutls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GnuTLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"gnutls\"","tags":["indices"]}},"/index/go-vulndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the go-vulndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Go Vulnerability Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/go-vulndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/go-vulndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GoVulnJSON-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"go-vulndb\"","tags":["indices"]}},"/index/golang":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the golang index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Golang packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/golang?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/golang?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"golang\"","tags":["indices"]}},"/index/google-0day-itw":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-0day-itw index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Project Zero In the Wild Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-0day-itw?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-0day-itw?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ITWExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"google-0day-itw\"","tags":["indices"]}},"/index/google-container-optimized-os":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the google-container-optimized-os index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Container OS Release Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/google-container-optimized-os?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/google-container-optimized-os?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ContainerOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"google-container-optimized-os\"","tags":["indices"]}},"/index/grafana":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the grafana index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Grafana Labs Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/grafana?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/grafana?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Grafana-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"grafana\"","tags":["indices"]}},"/index/greynoise-metadata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the greynoise-metadata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** GreyNoise Metadata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/greynoise-metadata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/greynoise-metadata?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_GreyNoiseDetection-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"greynoise-metadata\"","tags":["indices"]}},"/index/hackage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hackage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackage (Haskell) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hackage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hackage?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hackage\"","tags":["indices"]}},"/index/hacktivity":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hacktivity index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hackerone Hacktivity\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hacktivity?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hacktivity?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Hacktivity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hacktivity\"","tags":["indices"]}},"/index/harmonyos":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the harmonyos index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HarmonyOS Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/harmonyos?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/harmonyos?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HarmonyOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"harmonyos\"","tags":["indices"]}},"/index/hashicorp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hashicorp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HashiCorp Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hashicorp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hashicorp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HashiCorp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hashicorp\"","tags":["indices"]}},"/index/haskell-sadb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the haskell-sadb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Haskell Security Advisory DB\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/haskell-sadb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/haskell-sadb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HaskellSADBAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"haskell-sadb\"","tags":["indices"]}},"/index/hcl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hcl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HCLSoftware Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hcl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hcl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HCL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hcl\"","tags":["indices"]}},"/index/hex":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hex index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hex (Erlang) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hex?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hex?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hex\"","tags":["indices"]}},"/index/hikvision":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hikvision index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hikvision Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hikvision?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hikvision?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HIKVision-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hikvision\"","tags":["indices"]}},"/index/hillrom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hillrom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hillrom Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hillrom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hillrom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HillromAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hillrom\"","tags":["indices"]}},"/index/hitachi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Software Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Hitachi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hitachi\"","tags":["indices"]}},"/index/hitachi-energy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hitachi-energy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hitachi Energy Cybersecurity Advisories and Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hitachi-energy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hitachi-energy?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HitachiEnergy-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hitachi-energy\"","tags":["indices"]}},"/index/hkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Hong Kong CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hkcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HKCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hkcert\"","tags":["indices"]}},"/index/hms":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hms index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HMS (Hardware Meets Software) Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hms?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hms?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HMS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hms\"","tags":["indices"]}},"/index/honeywell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the honeywell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Honeywell Cyber Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/honeywell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/honeywell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Honeywell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"honeywell\"","tags":["indices"]}},"/index/hp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HP Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hp\"","tags":["indices"]}},"/index/hpe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the hpe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** HPE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/hpe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/hpe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HPE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"hpe\"","tags":["indices"]}},"/index/huawei-euleros":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-euleros index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenEuler Operating System Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-euleros?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-euleros?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HuaweiEulerOS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"huawei-euleros\"","tags":["indices"]}},"/index/huawei-ips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-ips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei IPS Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-ips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-ips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_HuaweiIPS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"huawei-ips\"","tags":["indices"]}},"/index/huawei-psirt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the huawei-psirt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Huawei Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/huawei-psirt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/huawei-psirt?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Huawei-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"huawei-psirt\"","tags":["indices"]}},"/index/iava":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the iava index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Information Assurance Vulnerability Alerts (IAVA)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/iava?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/iava?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IAVA-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"iava\"","tags":["indices"]}},"/index/ibm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ibm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IBM Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ibm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ibm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IBM-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ibm\"","tags":["indices"]}},"/index/idemia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the idemia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Idemia Product Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/idemia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/idemia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Idemia-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"idemia\"","tags":["indices"]}},"/index/igel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the igel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** IGEL Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/igel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/igel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Igel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"igel\"","tags":["indices"]}},"/index/il-alerts":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-alerts index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-alerts?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-alerts?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IsraeliAlert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"il-alerts\"","tags":["indices"]}},"/index/il-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the il-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Gov.il CVE Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/il-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/il-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IsraeliVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"il-vulnerabilities\"","tags":["indices"]}},"/index/incibe":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the incibe index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Incibe CERT Early Warnings\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/incibe?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/incibe?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IncibeAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"incibe\"","tags":["indices"]}},"/index/initial-access":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"initial-access\"","tags":["indices"]}},"/index/initial-access-git":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the initial-access-git index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Initial Access Intelligence Git Backup for Subscribers\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/initial-access-git?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/initial-access-git?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_InitialAccess-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"initial-access-git\"","tags":["indices"]}},"/index/intel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the intel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Intel® Product Security Center Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/intel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/intel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Intel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"intel\"","tags":["indices"]}},"/index/ipintel-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 10-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-10d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-10d\"","tags":["indices"]}},"/index/ipintel-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 30-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-30d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-30d\"","tags":["indices"]}},"/index/ipintel-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 3-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-3d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-3d\"","tags":["indices"]}},"/index/ipintel-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ipintel-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 90-Day IP Intelligence Index of Initial Access Targets and Command and Control Infrastructure\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ipintel-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ipintel-90d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify an IPv4 or IPv6 CIDR","in":"query","name":"cidr","schema":{"type":"string"}},{"description":"Autonomous system number","in":"query","name":"asn","schema":{"type":"string"}},{"description":"Country name ISO-3166?? format","in":"query","name":"country","schema":{"type":"string"}},{"description":"Country code in ISO-3166?? format","in":"query","name":"country_code","schema":{"type":"string"}},{"description":"Record type","in":"query","name":"id","schema":{"type":"string"}},{"description":"Kind of IpIntel Finding","in":"query","name":"kind","schema":{"type":"string"}},{"description":"Match a string in the list of hostnames","in":"query","name":"hostname","schema":{"type":"string"}},{"description":"Search for a string in the field describing the finding","in":"query","name":"matches","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IpIntelRecord-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ipintel-90d\"","tags":["indices"]}},"/index/istio":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the istio index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Istio Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/istio?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/istio?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Istio-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"istio\"","tags":["indices"]}},"/index/ivanti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ivanti-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ivanti\"","tags":["indices"]}},"/index/ivanti-rss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ivanti-rss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ivanti Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ivanti-rss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ivanti-rss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_IvantiRSS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ivanti-rss\"","tags":["indices"]}},"/index/jenkins":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jenkins index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Jenkins Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jenkins?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jenkins?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Jenkins-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jenkins\"","tags":["indices"]}},"/index/jetbrains":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jetbrains index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JetBrains Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jetbrains?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jetbrains?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JetBrains-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jetbrains\"","tags":["indices"]}},"/index/jfrog":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jfrog index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** JFrog Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jfrog?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jfrog?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JFrog-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jfrog\"","tags":["indices"]}},"/index/jnj":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jnj index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Johnson \u0026 Johnson Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jnj?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jnj?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JNJAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jnj\"","tags":["indices"]}},"/index/johnson-controls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the johnson-controls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Advisories - Johnson Controls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/johnson-controls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/johnson-controls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JohnsonControls-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"johnson-controls\"","tags":["indices"]}},"/index/juniper":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the juniper index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Juniper Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/juniper?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/juniper?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Juniper-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"juniper\"","tags":["indices"]}},"/index/jvn":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvn index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvn?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvn?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JVN-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jvn\"","tags":["indices"]}},"/index/jvndb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the jvndb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Japan Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/jvndb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/jvndb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_JVNAdvisoryItem-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"jvndb\"","tags":["indices"]}},"/index/kaspersky-ics-cert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kaspersky-ics-cert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kaspersky ICS CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kaspersky-ics-cert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kaspersky-ics-cert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KasperskyICSCERTAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"kaspersky-ics-cert\"","tags":["indices"]}},"/index/korelogic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the korelogic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KoreLogic Vulnerability Research and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/korelogic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/korelogic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KoreLogic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"korelogic\"","tags":["indices"]}},"/index/krcert-security-notices":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-security-notices index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-security-notices?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-security-notices?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"krcert-security-notices\"","tags":["indices"]}},"/index/krcert-vulnerabilities":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the krcert-vulnerabilities index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KR-CERT Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/krcert-vulnerabilities?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/krcert-vulnerabilities?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_KRCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"krcert-vulnerabilities\"","tags":["indices"]}},"/index/kubernetes":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kubernetes index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Kubernetes Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kubernetes?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kubernetes?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_K8S-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"kubernetes\"","tags":["indices"]}},"/index/kunbus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the kunbus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** KunBus Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/kunbus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/kunbus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Kunbus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"kunbus\"","tags":["indices"]}},"/index/lantronix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lantronix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lantronix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lantronix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lantronix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Lantronix-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lantronix\"","tags":["indices"]}},"/index/lenovo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lenovo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lenovo Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lenovo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lenovo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Lenovo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lenovo\"","tags":["indices"]}},"/index/lexmark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lexmark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Lexmark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lexmark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lexmark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LexmarkAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lexmark\"","tags":["indices"]}},"/index/lg":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lg index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** LG Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lg?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lg?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LG-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lg\"","tags":["indices"]}},"/index/libre-office":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the libre-office index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Libre Office Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/libre-office?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/libre-office?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LibreOffice-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"libre-office\"","tags":["indices"]}},"/index/linux":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the linux index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Linux Kernel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/linux?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/linux?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Linux-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"linux\"","tags":["indices"]}},"/index/lol-advs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the lol-advs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Living Off the Land Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/lol-advs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/lol-advs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_LolAdvs-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"lol-advs\"","tags":["indices"]}},"/index/m-files":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the m-files index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** M-Files Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/m-files?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/m-files?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MFiles-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"m-files\"","tags":["indices"]}},"/index/macert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the macert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moroccan CERT Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/macert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/macert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MACert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"macert\"","tags":["indices"]}},"/index/malicious-packages":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the malicious-packages index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Malicious Packages\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/malicious-packages?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/malicious-packages?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MaliciousPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"malicious-packages\"","tags":["indices"]}},"/index/manageengine":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the manageengine index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ManageEngine Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/manageengine?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/manageengine?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ManageEngineAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"manageengine\"","tags":["indices"]}},"/index/maven":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the maven index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Maven (Java) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/maven?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/maven?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"maven\"","tags":["indices"]}},"/index/mbed-tls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mbed-tls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mbed TLS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mbed-tls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mbed-tls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MbedTLS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mbed-tls\"","tags":["indices"]}},"/index/mcafee":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mcafee index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** McAfee Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mcafee?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mcafee?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_McAfee-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mcafee\"","tags":["indices"]}},"/index/mediatek":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mediatek index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MediaTek Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mediatek?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mediatek?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mediatek-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mediatek\"","tags":["indices"]}},"/index/medtronic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the medtronic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Medtronic Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/medtronic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/medtronic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MedtronicAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"medtronic\"","tags":["indices"]}},"/index/mendix":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mendix index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mendix Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mendix?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mendix?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mendix-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mendix\"","tags":["indices"]}},"/index/meta-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the meta-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Meta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/meta-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/meta-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetaAdvisories-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"meta-advisories\"","tags":["indices"]}},"/index/metasploit":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the metasploit index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Metasploit Modules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/metasploit?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/metasploit?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetasploitExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"metasploit\"","tags":["indices"]}},"/index/microsoft-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-csaf\"","tags":["indices"]}},"/index/microsoft-cvrf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-cvrf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-cvrf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-cvrf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftCVRF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-cvrf\"","tags":["indices"]}},"/index/microsoft-driver-block-list":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-driver-block-list index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft's Vulnerable Drivers Blocklist\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-driver-block-list?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-driver-block-list?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftDriverBlockList-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-driver-block-list\"","tags":["indices"]}},"/index/microsoft-kb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the microsoft-kb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Microsoft KB list by CVE\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/microsoft-kb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/microsoft-kb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MicrosoftKb-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"microsoft-kb\"","tags":["indices"]}},"/index/mikrotik":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mikrotik index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MikroTik Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mikrotik?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mikrotik?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mikrotik-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mikrotik\"","tags":["indices"]}},"/index/mindray":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mindray index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mindray Cybersecurity Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mindray?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mindray?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mindray-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mindray\"","tags":["indices"]}},"/index/misp-threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the misp-threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MISP Threat Actors\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/misp-threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/misp-threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MispValue-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"misp-threat-actors\"","tags":["indices"]}},"/index/mitel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Mitel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitel\"","tags":["indices"]}},"/index/mitre-attack-cve":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-attack-cve index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE ATT\u0026CK Technique ID to CVE List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-attack-cve?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-attack-cve?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_MitreAttackToCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitre-attack-cve\"","tags":["indices"]}},"/index/mitre-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitre-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MITRE CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitre-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitre-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MitreCVEListV5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitre-cvelist-v5\"","tags":["indices"]}},"/index/mitsubishi-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mitsubishi-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mitsubishi Electric Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mitsubishi-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mitsubishi-electric?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MitsubishiElectricAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mitsubishi-electric\"","tags":["indices"]}},"/index/mongodb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mongodb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** MongoDB Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mongodb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mongodb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MongoDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mongodb\"","tags":["indices"]}},"/index/moxa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the moxa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Moxa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/moxa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/moxa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MoxaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"moxa\"","tags":["indices"]}},"/index/mozilla":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the mozilla index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Mozilla Foundation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/mozilla?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/mozilla?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MozillaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"mozilla\"","tags":["indices"]}},"/index/naver":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the naver index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Naver Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/naver?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/naver?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Naver-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"naver\"","tags":["indices"]}},"/index/ncsc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NCSC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ncsc\"","tags":["indices"]}},"/index/ncsc-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ncsc-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NCSC CVEs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ncsc-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ncsc-cves?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NCSCCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ncsc-cves\"","tags":["indices"]}},"/index/nec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NEC Security Information Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NEC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nec\"","tags":["indices"]}},"/index/nessus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nessus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nessus Plugins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nessus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nessus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nessus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nessus\"","tags":["indices"]}},"/index/netapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NetApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netapp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NetApp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netapp\"","tags":["indices"]}},"/index/netatalk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netatalk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netatalk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netatalk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netatalk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netatalk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netatalk\"","tags":["indices"]}},"/index/netgate":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgate index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netgate Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgate?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgate?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netgate-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netgate\"","tags":["indices"]}},"/index/netgear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netgear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NETGEAR Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netgear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netgear?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netgear-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netgear\"","tags":["indices"]}},"/index/netskope":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the netskope index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Netskope Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/netskope?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/netskope?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Netskope-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"netskope\"","tags":["indices"]}},"/index/nexpose":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nexpose index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nexpose Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nexpose?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nexpose?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nexpose-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nexpose\"","tags":["indices"]}},"/index/nginx":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nginx index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nginx Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nginx?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nginx?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NginxAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nginx\"","tags":["indices"]}},"/index/nhs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nhs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NHS Cyber Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nhs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nhs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NHS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nhs\"","tags":["indices"]}},"/index/ni":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ni index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** National Instruments Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ni?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ni?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ni\"","tags":["indices"]}},"/index/nist-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 1.0 CVE data built from NIST NVD 2.0 CVE Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CveItems-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd\"","tags":["indices"]}},"/index/nist-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd2\"","tags":["indices"]}},"/index/nist-nvd2-cpematch":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-cpematch index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 CPE Match\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-cpematch?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-cpematch?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CPEMatch-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd2-cpematch\"","tags":["indices"]}},"/index/nist-nvd2-sources":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nist-nvd2-sources index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NIST NVD 2.0 Source Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nist-nvd2-sources?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nist-nvd2-sources?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NVD20Source-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nist-nvd2-sources\"","tags":["indices"]}},"/index/node-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the node-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Node.js Security Working Group Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/node-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/node-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NodeSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"node-security\"","tags":["indices"]}},"/index/nodejs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nodejs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NodeJS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nodejs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nodejs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NodeJS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nodejs\"","tags":["indices"]}},"/index/nokia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nokia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nokia Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nokia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nokia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nokia-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nokia\"","tags":["indices"]}},"/index/notepadplusplus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the notepadplusplus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Notepad++ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/notepadplusplus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/notepadplusplus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NotePadPlusPlus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"notepadplusplus\"","tags":["indices"]}},"/index/nozomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nozomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nozomi Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nozomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nozomi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nozomi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nozomi\"","tags":["indices"]}},"/index/npm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the npm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NPM (JS/TS) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/npm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/npm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"npm\"","tags":["indices"]}},"/index/ntp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ntp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NTP Security Issues\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ntp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ntp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NTP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ntp\"","tags":["indices"]}},"/index/nuclei":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuclei index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuclei Templates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuclei?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuclei?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Nuclei-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nuclei\"","tags":["indices"]}},"/index/nuget":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nuget index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Nuget (C#/F#) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nuget?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nuget?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nuget\"","tags":["indices"]}},"/index/nvd-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvd-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVD's CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvd-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvd-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NVDCPEDictionary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nvd-cpe-dictionary\"","tags":["indices"]}},"/index/nvidia":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nvidia index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** NVIDIA Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nvidia?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nvidia?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SecurityBulletin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nvidia\"","tags":["indices"]}},"/index/nz-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the nz-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CERT NZ Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/nz-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/nz-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_NZAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"nz-advisories\"","tags":["indices"]}},"/index/octopus-deploy":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the octopus-deploy index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Octopus Deploy Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/octopus-deploy?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/octopus-deploy?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OctopusDeploy-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"octopus-deploy\"","tags":["indices"]}},"/index/okta":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the okta index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Okta Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/okta?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/okta?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Okta-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"okta\"","tags":["indices"]}},"/index/omron":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the omron index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Omron Vulnerability Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/omron?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/omron?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Omron-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"omron\"","tags":["indices"]}},"/index/one-e":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the one-e index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** 1E Published Product Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/one-e?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/one-e?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OneE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"one-e\"","tags":["indices"]}},"/index/opam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** opam (OCaml) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opam?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"opam\"","tags":["indices"]}},"/index/open-cvdb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the open-cvdb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** The Open Cloud Vulnerability \u0026 Security Issue Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/open-cvdb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/open-cvdb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenCVDB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"open-cvdb\"","tags":["indices"]}},"/index/openbsd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openbsd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenBSD Security Fixes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openbsd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openbsd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenBSD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openbsd\"","tags":["indices"]}},"/index/opengear":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the opengear index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Opengear Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/opengear?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/opengear?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Opengear-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"opengear\"","tags":["indices"]}},"/index/openjdk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openjdk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenJDK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openjdk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openjdk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenJDK-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openjdk\"","tags":["indices"]}},"/index/openssh":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssh index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSH Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssh?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssh?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenSSH-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openssh\"","tags":["indices"]}},"/index/openssl-secadv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openssl-secadv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenSSL Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openssl-secadv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openssl-secadv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenSSLSecAdv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openssl-secadv\"","tags":["indices"]}},"/index/openstack":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openstack index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenStack Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openstack?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openstack?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OpenStack-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openstack\"","tags":["indices"]}},"/index/openwrt":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the openwrt index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OpenWrt Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/openwrt?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/openwrt?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WRT-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"openwrt\"","tags":["indices"]}},"/index/oracle":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_MetaData-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"oracle\"","tags":["indices"]}},"/index/oracle-cpu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Update Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OracleCPU-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"oracle-cpu\"","tags":["indices"]}},"/index/oracle-cpu-csaf":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the oracle-cpu-csaf index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Oracle Critical Patch Updates CSAF\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/oracle-cpu-csaf?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/oracle-cpu-csaf?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OracleCPUCSAF-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"oracle-cpu-csaf\"","tags":["indices"]}},"/index/osv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the osv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Open Source Vulnerabilities Database\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/osv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/osv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OSV-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"osv\"","tags":["indices"]}},"/index/otrs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the otrs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OTRS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/otrs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/otrs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OTRS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"otrs\"","tags":["indices"]}},"/index/owncloud":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the owncloud index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** OwnCloud Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/owncloud?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/owncloud?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_OwnCloud-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"owncloud\"","tags":["indices"]}},"/index/packetstorm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the packetstorm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PacketStorm\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/packetstorm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/packetstorm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PacketstormExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"packetstorm\"","tags":["indices"]}},"/index/palantir":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palantir index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palantir Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palantir?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palantir?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Palantir-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"palantir\"","tags":["indices"]}},"/index/palo-alto":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the palo-alto index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Palo Alto Networks Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/palo-alto?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/palo-alto?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PaloAltoAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"palo-alto\"","tags":["indices"]}},"/index/panasonic":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the panasonic index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Panasonic Vulnerability Advisory List\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/panasonic?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/panasonic?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Panasonic-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"panasonic\"","tags":["indices"]}},"/index/papercut":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the papercut index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PaperCut Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/papercut?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/papercut?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PaperCut-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"papercut\"","tags":["indices"]}},"/index/pega":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pega index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pega Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pega?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pega?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Pega-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pega\"","tags":["indices"]}},"/index/philips":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the philips index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Philips Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/philips?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/philips?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PhilipsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"philips\"","tags":["indices"]}},"/index/phoenix-contact":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the phoenix-contact index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Phoenix Contact Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/phoenix-contact?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/phoenix-contact?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PhoenixContactAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"phoenix-contact\"","tags":["indices"]}},"/index/php-my-admin":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the php-my-admin index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** phpMyAdmin Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/php-my-admin?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/php-my-admin?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PHPMyAdmin-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"php-my-admin\"","tags":["indices"]}},"/index/pkcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pkcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PK CERT Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pkcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pkcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PKCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pkcert\"","tags":["indices"]}},"/index/postgressql":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the postgressql index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PostgresSQL Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/postgressql?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/postgressql?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PostgresSQL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"postgressql\"","tags":["indices"]}},"/index/powerdns":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the powerdns index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PowerDNS Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/powerdns?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/powerdns?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PowerDNS-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"powerdns\"","tags":["indices"]}},"/index/progress":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the progress index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Progress Product Alert Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/progress?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/progress?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Progress-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"progress\"","tags":["indices"]}},"/index/proofpoint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the proofpoint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Proofpoint Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/proofpoint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/proofpoint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Proofpoint-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"proofpoint\"","tags":["indices"]}},"/index/ptc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ptc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PTC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ptc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ptc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PTC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ptc\"","tags":["indices"]}},"/index/pub":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pub index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pub (Dart/Flutter) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pub?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pub?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pub\"","tags":["indices"]}},"/index/pure-storage":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pure-storage index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Pure Storage Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pure-storage?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pure-storage?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PureStorage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pure-storage\"","tags":["indices"]}},"/index/pypa-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypa-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPA Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypa-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypa-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_PyPAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pypa-advisories\"","tags":["indices"]}},"/index/pypi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the pypi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** PyPi (Python) packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/pypi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/pypi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"pypi\"","tags":["indices"]}},"/index/qnap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qnap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** QNAP Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qnap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qnap?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QNAPAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qnap\"","tags":["indices"]}},"/index/qqids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qqids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QIDs\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qqids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qqids?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QQID-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qqids\"","tags":["indices"]}},"/index/qualcomm":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualcomm index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualcomm Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualcomm?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualcomm?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Qualcomm-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qualcomm\"","tags":["indices"]}},"/index/qualys":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Qualys-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qualys\"","tags":["indices"]}},"/index/qualys-qids":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qualys-qids index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qualys QID\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qualys-qids?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qualys-qids?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QualysQID-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qualys-qids\"","tags":["indices"]}},"/index/qubes-qsb":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the qubes-qsb index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Qubes Security Bulletin\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/qubes-qsb?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/qubes-qsb?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_QSB-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"qubes-qsb\"","tags":["indices"]}},"/index/ransomware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ransomware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Ransomware\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ransomware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ransomware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RansomwareExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ransomware\"","tags":["indices"]}},"/index/red-lion":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the red-lion index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red-Lion Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/red-lion?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/red-lion?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RedLion-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"red-lion\"","tags":["indices"]}},"/index/redhat":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Red Hat Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RedhatCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"redhat\"","tags":["indices"]}},"/index/redhat-cves":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the redhat-cves index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSAF data for redhat\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/redhat-cves?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/redhat-cves?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RhelCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"redhat-cves\"","tags":["indices"]}},"/index/renesas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the renesas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Renesas Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/renesas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/renesas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Renesas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"renesas\"","tags":["indices"]}},"/index/revive":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the revive index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Revive Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/revive?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/revive?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Revive-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"revive\"","tags":["indices"]}},"/index/roche":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the roche index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Roche Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/roche?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/roche?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Roche-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"roche\"","tags":["indices"]}},"/index/rockwell":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rockwell index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rockwell Automation Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rockwell?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rockwell?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Rockwell-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rockwell\"","tags":["indices"]}},"/index/rocky":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Linux Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_Update-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rocky\"","tags":["indices"]}},"/index/rocky-errata":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-errata index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Errata\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-errata?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-errata?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RockyErrata-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rocky-errata\"","tags":["indices"]}},"/index/rocky-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rocky-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rocky Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rocky-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rocky-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rocky-purls\"","tags":["indices"]}},"/index/rsync":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rsync index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Rsync Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rsync?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rsync?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Rsync-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rsync\"","tags":["indices"]}},"/index/ruckus":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ruckus index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ruckus Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ruckus?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ruckus?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ruckus-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ruckus\"","tags":["indices"]}},"/index/rustsec-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the rustsec-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** RustSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/rustsec-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/rustsec-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_RustsecAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"rustsec-advisories\"","tags":["indices"]}},"/index/sacert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sacert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Saudi CERT\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sacert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sacert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SAAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sacert\"","tags":["indices"]}},"/index/safran":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the safran index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Safran Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/safran?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/safran?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Safran-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"safran\"","tags":["indices"]}},"/index/saint":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the saint index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAINT Exploits\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/saint?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/saint?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SaintExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"saint\"","tags":["indices"]}},"/index/salesforce":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the salesforce index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SalesForce Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/salesforce?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/salesforce?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SalesForce-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"salesforce\"","tags":["indices"]}},"/index/samba":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the samba index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Samba Security Releases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/samba?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/samba?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Samba-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"samba\"","tags":["indices"]}},"/index/sandisk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sandisk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sandisk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sandisk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sandisk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sandisk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sandisk\"","tags":["indices"]}},"/index/sans-dshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sans-dshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SANS DShield Honeypot Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sans-dshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sans-dshield?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SansDshield-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sans-dshield\"","tags":["indices"]}},"/index/sap":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sap index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SAP Security Patch Days\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sap?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sap?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SAP-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sap\"","tags":["indices"]}},"/index/schneider-electric":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schneider-electric index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schneider Electric Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schneider-electric?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schneider-electric?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SchneiderElectricAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"schneider-electric\"","tags":["indices"]}},"/index/schutzwerk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the schutzwerk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schutzwerk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/schutzwerk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/schutzwerk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Schutzwerk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"schutzwerk\"","tags":["indices"]}},"/index/sec-consult":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sec-consult index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SEC Consult Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sec-consult?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sec-consult?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SECConsult-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sec-consult\"","tags":["indices"]}},"/index/securitylab":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the securitylab index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Security Lab Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/securitylab?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/securitylab?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SecurityLab-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"securitylab\"","tags":["indices"]}},"/index/seebug":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the seebug index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Seebug Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/seebug?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/seebug?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SeebugExploit-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"seebug\"","tags":["indices"]}},"/index/sel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Schweitzer Engineering Laboratories Security Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sel\"","tags":["indices"]}},"/index/sentinelone":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sentinelone index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SentinelOne Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sentinelone?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sentinelone?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SentinelOne-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sentinelone\"","tags":["indices"]}},"/index/servicenow":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the servicenow index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ServiceNow CVE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/servicenow?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/servicenow?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ServiceNow-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"servicenow\"","tags":["indices"]}},"/index/shadowserver-exploited":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shadowserver-exploited index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shadowserver Foundation Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shadowserver-exploited?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shadowserver-exploited?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ShadowServerExploitedVulnerability-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"shadowserver-exploited\"","tags":["indices"]}},"/index/shielder":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the shielder index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Shielder Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/shielder?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/shielder?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Shielder-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"shielder\"","tags":["indices"]}},"/index/sick":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sick index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SICK Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sick?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sick?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sick-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sick\"","tags":["indices"]}},"/index/siemens":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the siemens index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Siemens Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/siemens?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/siemens?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SiemensAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"siemens\"","tags":["indices"]}},"/index/sierra-wireless":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sierra-wireless index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sierra Wireless Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sierra-wireless?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sierra-wireless?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SierraWireless-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sierra-wireless\"","tags":["indices"]}},"/index/sigmahq-sigma-rules":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sigmahq-sigma-rules index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sigma Rules\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sigmahq-sigma-rules?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sigmahq-sigma-rules?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SigmaRule-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sigmahq-sigma-rules\"","tags":["indices"]}},"/index/singcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the singcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CSA Alerts and Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/singcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/singcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SingCert-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"singcert\"","tags":["indices"]}},"/index/sitecore":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sitecore index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sitecore Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sitecore?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sitecore?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sitecore-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sitecore\"","tags":["indices"]}},"/index/slackware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the slackware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Slackware Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/slackware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/slackware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Slackware-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"slackware\"","tags":["indices"]}},"/index/solarwinds":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solarwinds index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SolarWinds Security Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solarwinds?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solarwinds?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SolarWindsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"solarwinds\"","tags":["indices"]}},"/index/solr":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the solr index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Solr CVE Reports\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/solr?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/solr?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Solr-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"solr\"","tags":["indices"]}},"/index/sonatype":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonatype index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sonatype Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonatype?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonatype?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sonatype-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sonatype\"","tags":["indices"]}},"/index/sonicwall":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sonicwall index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SonicWall Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sonicwall?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sonicwall?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SonicWallAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sonicwall\"","tags":["indices"]}},"/index/spacelabs-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spacelabs-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spacelabs Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spacelabs-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spacelabs-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SpacelabsHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"spacelabs-healthcare\"","tags":["indices"]}},"/index/splunk":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the splunk index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Splunk Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/splunk?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/splunk?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Splunk-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"splunk\"","tags":["indices"]}},"/index/spring":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the spring index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Spring Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/spring?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/spring?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Spring-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"spring\"","tags":["indices"]}},"/index/ssd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ssd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SSD Secure Disclosure Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ssd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ssd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SSDAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ssd\"","tags":["indices"]}},"/index/stormshield":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stormshield index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stormshield Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stormshield?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stormshield?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Stormshield-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"stormshield\"","tags":["indices"]}},"/index/stryker":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the stryker index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Stryker Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/stryker?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/stryker?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_StrykerAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"stryker\"","tags":["indices"]}},"/index/sudo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the sudo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Sudo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/sudo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/sudo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Sudo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"sudo\"","tags":["indices"]}},"/index/suse":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SUSE Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Cvrf-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"suse\"","tags":["indices"]}},"/index/suse-security":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the suse-security index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Suse Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/suse-security?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/suse-security?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SuseSecurity-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"suse-security\"","tags":["indices"]}},"/index/swift":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swift index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swift packages with package versions\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swift?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swift?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_OSSPackage-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"swift\"","tags":["indices"]}},"/index/swisslog-healthcare":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the swisslog-healthcare index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Swisslog Healthcare CVE Disclosures\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/swisslog-healthcare?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/swisslog-healthcare?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SwisslogHealthcareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"swisslog-healthcare\"","tags":["indices"]}},"/index/symfony":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the symfony index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Symfony Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/symfony?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/symfony?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Symfony-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"symfony\"","tags":["indices"]}},"/index/synacktiv":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synacktiv index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synacktiv Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synacktiv?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synacktiv?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Synacktiv-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"synacktiv\"","tags":["indices"]}},"/index/syncrosoft":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syncrosoft index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** SyncroSoft Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syncrosoft?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syncrosoft?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_SyncroSoft-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"syncrosoft\"","tags":["indices"]}},"/index/synology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the synology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Synology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/synology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/synology?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Synology-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"synology\"","tags":["indices"]}},"/index/syss":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the syss index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Syss Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/syss?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/syss?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Syss-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"syss\"","tags":["indices"]}},"/index/tailscale":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tailscale index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tailscale Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tailscale?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tailscale?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tailscale-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tailscale\"","tags":["indices"]}},"/index/teamviewer":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the teamviewer index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TeamViewer Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/teamviewer?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/teamviewer?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TeamViewer-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"teamviewer\"","tags":["indices"]}},"/index/tenable-research-advisories":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tenable-research-advisories index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tenable Research Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tenable-research-advisories?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tenable-research-advisories?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TenableResearchAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tenable-research-advisories\"","tags":["indices"]}},"/index/tencent":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tencent index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Tencent Vulnerability Risk Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tencent?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tencent?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tencent-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tencent\"","tags":["indices"]}},"/index/thales":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thales index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thales Security Updates\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thales?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thales?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Thales-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"thales\"","tags":["indices"]}},"/index/themissinglink":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the themissinglink index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** the missing link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/themissinglink?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/themissinglink?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TheMissingLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"themissinglink\"","tags":["indices"]}},"/index/thermo-fisher":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the thermo-fisher index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Thermo Fisher Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/thermo-fisher?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/thermo-fisher?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ThermoFisher-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"thermo-fisher\"","tags":["indices"]}},"/index/threat-actors":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the threat-actors index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Threat Actors Data\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/threat-actors?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/threat-actors?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ThreatActorWithExternalObjects-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"threat-actors\"","tags":["indices"]}},"/index/ti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Texas Instruments Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TI-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ti\"","tags":["indices"]}},"/index/tibco":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tibco index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TIBCO Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tibco?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tibco?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Tibco-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tibco\"","tags":["indices"]}},"/index/tp-link":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the tp-link index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** TP-Link Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/tp-link?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/tp-link?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TPLink-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"tp-link\"","tags":["indices"]}},"/index/trane-technology":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trane-technology index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trane Technology Product Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trane-technology?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trane-technology?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TraneTechnology-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"trane-technology\"","tags":["indices"]}},"/index/trendmicro":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trendmicro index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trend Micro Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trendmicro?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trendmicro?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TrendMicro-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"trendmicro\"","tags":["indices"]}},"/index/trustwave":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the trustwave index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Trustwave Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/trustwave?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/trustwave?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Trustwave-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"trustwave\"","tags":["indices"]}},"/index/twcert":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the twcert index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Taiwan CERT Vulnerability Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/twcert?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/twcert?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_TWCertAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"twcert\"","tags":["indices"]}},"/index/ubiquiti":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubiquiti index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubiquiti Security Advisory Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubiquiti?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubiquiti?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Ubiquiti-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ubiquiti\"","tags":["indices"]}},"/index/ubuntu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_UbuntuCVE-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ubuntu\"","tags":["indices"]}},"/index/ubuntu-purls":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the ubuntu-purls index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Ubuntu Purls\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/ubuntu-purls?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/ubuntu-purls?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_purls_PurlResponse-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"ubuntu-purls\"","tags":["indices"]}},"/index/unify":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unify index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Unify Product Security Advisories and Security Notes\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unify?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unify?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Unify-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"unify\"","tags":["indices"]}},"/index/unisoc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the unisoc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** UNISOC Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/unisoc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/unisoc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Unisoc-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"unisoc\"","tags":["indices"]}},"/index/usd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** usd Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_USD-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"usd\"","tags":["indices"]}},"/index/usom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the usom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** USOM Security Notices\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/usom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/usom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_USOMAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"usom\"","tags":["indices"]}},"/index/vandyke":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vandyke index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VanDyke Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vandyke?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vandyke?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VanDyke-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vandyke\"","tags":["indices"]}},"/index/vapidlabs":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vapidlabs index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VapidLabs Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vapidlabs?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vapidlabs?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VapidLabsAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vapidlabs\"","tags":["indices"]}},"/index/vc-cpe-dictionary":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vc-cpe-dictionary index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CPE Dictionary\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vc-cpe-dictionary?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vc-cpe-dictionary?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VCCPEDictionary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vc-cpe-dictionary\"","tags":["indices"]}},"/index/vde":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vde index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VDE CERT Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vde?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vde?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VDEAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vde\"","tags":["indices"]}},"/index/veeam":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veeam index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veeam Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veeam?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veeam?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Veeam-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"veeam\"","tags":["indices"]}},"/index/veritas":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the veritas index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Veritas Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/veritas?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/veritas?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Veritas-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"veritas\"","tags":["indices"]}},"/index/virtuozzo":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the virtuozzo index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Virtuozzo Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/virtuozzo?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/virtuozzo?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Virtuozzo-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"virtuozzo\"","tags":["indices"]}},"/index/vlc":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vlc index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VLC Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vlc?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vlc?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VLC-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vlc\"","tags":["indices"]}},"/index/vmware":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vmware index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VMWare Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vmware?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vmware?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VMWareAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vmware\"","tags":["indices"]}},"/index/voidsec":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the voidsec index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VoidSec Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/voidsec?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/voidsec?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VoidSec-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"voidsec\"","tags":["indices"]}},"/index/vulncheck":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheck-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck\"","tags":["indices"]}},"/index/vulncheck-canaries":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries\"","tags":["indices"]}},"/index/vulncheck-canaries-10d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-10d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (10 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-10d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-10d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-10d\"","tags":["indices"]}},"/index/vulncheck-canaries-30d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-30d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (30 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-30d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-30d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-30d\"","tags":["indices"]}},"/index/vulncheck-canaries-3d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-3d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (3 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-3d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-3d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-3d\"","tags":["indices"]}},"/index/vulncheck-canaries-90d":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-canaries-90d index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Canary Intel (90 day)\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-canaries-90d?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-canaries-90d?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"src_country","schema":{"type":"string"}},{"description":"Country code in ISO-3166 format","in":"query","name":"dst_country","schema":{"type":"string"}},{"description":"Source IP address","in":"query","name":"src_ip","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnCheckCanary-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-canaries-90d\"","tags":["indices"]}},"/index/vulncheck-config":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-config index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck Configurations\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-config?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-config?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckConfig-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-config\"","tags":["indices"]}},"/index/vulncheck-cvelist-v5":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-cvelist-v5 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck CVEList V5\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-cvelist-v5?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-cvelist-v5?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckCVEListV5-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-cvelist-v5\"","tags":["indices"]}},"/index/vulncheck-kev":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-kev index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck KEV\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-kev?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-kev?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VulnCheckKEV-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-kev\"","tags":["indices"]}},"/index/vulncheck-nvd":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_CveItemsExtended-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd\"","tags":["indices"]}},"/index/vulncheck-nvd2":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulncheck-nvd2 index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** VulnCheck NVD V2\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulncheck-nvd2?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulncheck-nvd2?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_NVD20CVEExtended-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulncheck-nvd2\"","tags":["indices"]}},"/index/vulnerability-aliases":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnerability-aliases index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vulnerability Aliases\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnerability-aliases?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnerability-aliases?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_api_VulnerabilityAlias-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulnerability-aliases\"","tags":["indices"]}},"/index/vulnrichment":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vulnrichment index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** CISA Vulnrichment\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vulnrichment?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vulnrichment?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Vulnrichment-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vulnrichment\"","tags":["indices"]}},"/index/vyaire":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the vyaire index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Vyaire Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/vyaire?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/vyaire?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_VYAIREAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"vyaire\"","tags":["indices"]}},"/index/watchguard":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the watchguard index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Watchguard Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/watchguard?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/watchguard?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WatchGuard-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"watchguard\"","tags":["indices"]}},"/index/whatsapp":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the whatsapp index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WhatsApp Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/whatsapp?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/whatsapp?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WhatsApp-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"whatsapp\"","tags":["indices"]}},"/index/wibu":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wibu index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wibu Systems Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wibu?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wibu?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wibu-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wibu\"","tags":["indices"]}},"/index/wireshark":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wireshark index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wireshark Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wireshark?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wireshark?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wireshark-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wireshark\"","tags":["indices"]}},"/index/with-secure":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the with-secure index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** With Secure Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/with-secure?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/with-secure?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WithSecure-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"with-secure\"","tags":["indices"]}},"/index/wolfi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wolfi Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wolfi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wolfi\"","tags":["indices"]}},"/index/wolfssl":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wolfssl index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** WolfSSL Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wolfssl?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wolfssl?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_WolfSSL-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wolfssl\"","tags":["indices"]}},"/index/wordfence":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the wordfence index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Wordfence Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/wordfence?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/wordfence?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Wordfence-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"wordfence\"","tags":["indices"]}},"/index/xen":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xen index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xen Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xen?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xen?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xen-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xen\"","tags":["indices"]}},"/index/xerox":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xerox index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xerox Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xerox?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xerox?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xerox-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xerox\"","tags":["indices"]}},"/index/xiaomi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xiaomi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xiaomi Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xiaomi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xiaomi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xiaomi-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xiaomi\"","tags":["indices"]}},"/index/xylem":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the xylem index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Xylem Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/xylem?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/xylem?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Xylem-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"xylem\"","tags":["indices"]}},"/index/yamaha":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yamaha index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yamaha Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yamaha?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yamaha?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Yamaha-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"yamaha\"","tags":["indices"]}},"/index/yokogawa":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yokogawa index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yokogawa Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yokogawa?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yokogawa?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_YokogawaAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"yokogawa\"","tags":["indices"]}},"/index/yubico":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the yubico index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Yubico Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/yubico?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/yubico?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Yubico-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"yubico\"","tags":["indices"]}},"/index/zdi":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zdi index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zero Day Initiative Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zdi?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zdi?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ZeroDayAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zdi\"","tags":["indices"]}},"/index/zebra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zebra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zebra Security Alerts\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zebra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zebra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zebra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zebra\"","tags":["indices"]}},"/index/zeroscience":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zeroscience index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZeroScience Vulnerabilities\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zeroscience?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zeroscience?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_ZeroScienceAdvisory-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zeroscience\"","tags":["indices"]}},"/index/zimbra":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zimbra index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zimbra Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zimbra?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zimbra?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zimbra-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zimbra\"","tags":["indices"]}},"/index/zoom":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zoom index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zoom Security Bulletins\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zoom?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zoom?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zoom-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zoom\"","tags":["indices"]}},"/index/zscaler":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zscaler index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zscaler Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zscaler?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zscaler?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zscaler-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zscaler\"","tags":["indices"]}},"/index/zuso":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zuso index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** ZUSO Vulnerability Notifications\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zuso?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zuso?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zuso-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zuso\"","tags":["indices"]}},"/index/zyxel":{"get":{"description":"### Overview\nThis endpoint allows you to retrieve a paginated list of all documents from the zyxel index. \\\nBy default, a maximum of 100 documents are shown per page.\n\n**Index Description:** Zyxel Security Advisories\n\n### Paging Over Large Data (cursor)\nIn order to allow users to iterate over large index datasets, this endpoint provides a server-side\n\"cursor\" mechanism. To use the cursor, first call `GET /index/zyxel?start_cursor`, the response will\nhave a `next_cursor` id that clients will need to pass as a query parameter to the next request like\n`GET /index/zyxel?cursor=\u003cnext_cursor_id\u003e`\n","parameters":[{"description":"set the page number of the response","in":"query","name":"page","schema":{"type":"integer"}},{"description":"limit the number of findings in the response","in":"query","name":"limit","schema":{"type":"integer"}},{"description":"continue server-side paging using a cursor id","in":"query","name":"cursor","schema":{"type":"string"}},{"description":"request server-side paging","in":"query","name":"start_cursor","schema":{"enum":["true"],"type":"string"}},{"description":"direction of the sort","in":"query","name":"order","schema":{"enum":["asc","desc"],"type":"string"}},{"description":"field by which to sort the results","in":"query","name":"sort","schema":{"type":"string"}},{"description":"Specify a CVE ID to search with.","in":"query","name":"cve","schema":{"type":"string"}},{"description":"Specify a vulnerability alias to search with.","in":"query","name":"alias","schema":{"type":"string"}},{"description":"Specify an IAVA ID to search with.","in":"query","name":"iava","schema":{"type":"string"}},{"description":"Specify a JVNDB ID to search with.","in":"query","name":"jvndb","schema":{"type":"string"}},{"description":"Specify an ILVN ID to search with.","in":"query","name":"ilvn","schema":{"type":"string"}},{"description":"Specify a threat actor name to search with.","in":"query","name":"threat_actor","schema":{"type":"string"}},{"description":"Specify a MITRE ID to search with.","in":"query","name":"mitre_id","schema":{"type":"string"}},{"description":"Specify a MISP ID to search with.","in":"query","name":"misp_id","schema":{"type":"string"}},{"description":"Specify a ransomeware family name to search with.","in":"query","name":"ransomware","schema":{"type":"string"}},{"description":"Specify a botnet name to search with.","in":"query","name":"botnet","schema":{"type":"string"}},{"description":"Specify a published date","in":"query","name":"published","schema":{"type":"string"}},{"description":"Specify an exact published date to filter with.","in":"query","name":"date","schema":{"type":"string"}},{"description":"Specify a starting 'updated-at' date to filter with.","in":"query","name":"updatedAtStartDate","schema":{"type":"string"}},{"description":"Specify an ending 'updated-at' date to filter with.","in":"query","name":"updatedAtEndDate","schema":{"type":"string"}},{"description":"Specify a starting last modified date to filter with.","in":"query","name":"lastModStartDate","schema":{"type":"string"}},{"description":"Specify an ending last modified date to filter with.","in":"query","name":"lastModEndDate","schema":{"type":"string"}},{"description":"Specify a starting published date to filter with.","in":"query","name":"pubStartDate","schema":{"type":"string"}},{"description":"Specify an ending published date to filter with.","in":"query","name":"pubEndDate","schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-array_advisory_Zyxel-paginate_Pagination"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return vulnerability data stored in index \"zyxel\"","tags":["indices"]}},"/openapi":{"get":{"description":"Return the VulnCheck API (v3) OpenAPI specification","responses":{"200":{"content":{"application/json":{"schema":{"additionalProperties":{},"type":"object"}}},"description":"OK"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Return OpenAPI specification","tags":["endpoints"]}},"/pdns/vulncheck-c2":{"get":{"description":"Retrieve a list of hostnames, identified as running Command \u0026 Control infrastructure.","parameters":[{"description":"Format of the Hostnames in the response (Defaults To: text)","in":"query","name":"format","schema":{"enum":["txt","json","text"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Retrieve a list of C2 Hostnames","tags":["endpoints"]}},"/purl":{"get":{"description":"Based on the specified PURL, this endpoint will return a list of vulnerabilities that are related to the package. We currently support hex, golang, hackage, npm, and pypi","parameters":[{"description":"URL string used to identify and locate a software package","in":"query","name":"purl","required":true,"schema":{"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_PurlResponseData-v3controllers_PurlResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Request vulnerabilities related to a PURL","tags":["endpoints"]}},"/purls":{"post":{"description":"Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities","requestBody":{"content":{"application/json":{"schema":{"items":{"type":"string"},"title":"purls","type":"array"}}},"description":"PURL strings used to identify and locate software packages","required":true},"responses":{"200":{"content":{"application/json":{"schema":{"$ref":"#/components/schemas/render.ResponseWithMetadata-v3controllers_PurlsResponseData-v3controllers_PurlsResponseMetadata"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Request vulnerabilities related to a list of PURLs","tags":["endpoints"]}},"/rules/initial-access/{type}":{"get":{"description":"Retrieve set of initial-access detection rules by type","parameters":[{"description":"Type of ruleset to retrieve","in":"path","name":"type","required":true,"schema":{"enum":["snort","suricata"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Retrieve set of initial-access detection rules","tags":["endpoints"]}},"/tags/vulncheck-c2":{"get":{"description":"Retrieve a list of IP addresses, identified as running Command \u0026 Control infrastructure","parameters":[{"description":"Format of the IP Addresses in the response (Defaults To: text)","in":"query","name":"format","schema":{"enum":["txt","json","text"],"type":"string"}}],"responses":{"200":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"OK"},"404":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Not Found"},"500":{"content":{"application/json":{"schema":{"type":"string"}}},"description":"Internal Server Error"}},"security":[{"Bearer":[]}],"summary":"Retrieve a list of C2 IP addresses","tags":["endpoints"]}}},"servers":[{"description":"VulnCheck API v3","url":"/v3"}]} \ No newline at end of file diff --git a/poetry.lock b/poetry.lock index b1e10efc..58e0e47a 100644 --- a/poetry.lock +++ b/poetry.lock @@ -213,14 +213,14 @@ files = [ [[package]] name = "attrs" -version = "25.4.0" +version = "26.1.0" description = "Classes Without Boilerplate" optional = false python-versions = ">=3.9" groups = ["main"] files = [ - {file = "attrs-25.4.0-py3-none-any.whl", hash = "sha256:adcf7e2a1fb3b36ac48d97835bb6d8ade15b8dcce26aba8bf1d14847b57a3373"}, - {file = "attrs-25.4.0.tar.gz", hash = "sha256:16d5969b87f0859ef33a48b35d55ac1be6e42ae49d5e853b597db70c35c57e11"}, + {file = "attrs-26.1.0-py3-none-any.whl", hash = "sha256:c647aa4a12dfbad9333ca4e71fe62ddc36f4e63b2d260a37a8b83d2f043ac309"}, + {file = "attrs-26.1.0.tar.gz", hash = "sha256:d03ceb89cb322a8fd706d4fb91940737b6642aa36998fe130a9bc96c985eff32"}, ] [[package]] @@ -1304,14 +1304,14 @@ dev = ["argcomplete", "attrs (>=19.2)", "hypothesis (>=3.56)", "mock", "requests [[package]] name = "pytest-cov" -version = "7.0.0" +version = "7.1.0" description = "Pytest plugin for measuring coverage." optional = false python-versions = ">=3.9" groups = ["dev"] files = [ - {file = "pytest_cov-7.0.0-py3-none-any.whl", hash = "sha256:3b8e9558b16cc1479da72058bdecf8073661c7f57f7d3c5f22a1c23507f2d861"}, - {file = "pytest_cov-7.0.0.tar.gz", hash = "sha256:33c97eda2e049a0c5298e91f519302a1334c26ac65c1a483d6206fd458361af1"}, + {file = "pytest_cov-7.1.0-py3-none-any.whl", hash = "sha256:a0461110b7865f9a271aa1b51e516c9a95de9d696734a2f71e3e78f46e1d4678"}, + {file = "pytest_cov-7.1.0.tar.gz", hash = "sha256:30674f2b5f6351aa09702a9c8c364f6a01c27aae0c1366ae8016160d1efc56b2"}, ] [package.dependencies] diff --git a/pyproject.toml b/pyproject.toml index 1a5d9aa4..6f4778eb 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -1,6 +1,6 @@ [project] name = "vulncheck_sdk" -version = "0.0.41" +version = "0.0.42" description = "VulnCheck API" authors = [ {name = "VulnCheck API Support",email = "support@vulncheck.com"}, diff --git a/python-generator-config.yaml b/python-generator-config.yaml index 3d6ede8d..595c5b23 100644 --- a/python-generator-config.yaml +++ b/python-generator-config.yaml @@ -2,4 +2,4 @@ additionalProperties: projectName: "vulncheck-sdk" packageName: "vulncheck_sdk" packageUrl: "https://github.com/vulncheck-oss/sdk-python/tree/main" - packageVersion: "0.0.41" + packageVersion: "0.0.42" diff --git a/setup.py b/setup.py index 6f0c5b49..faf6966d 100644 --- a/setup.py +++ b/setup.py @@ -22,7 +22,7 @@ # prerequisite: setuptools # http://pypi.python.org/pypi/setuptools NAME = "vulncheck-sdk" -VERSION = "0.0.41" +VERSION = "0.0.42" PYTHON_REQUIRES = ">= 3.9" REQUIRES = [ "aiohttp_retry >= 2.8.3", diff --git a/test/aio/test_advisory_adobe_advisory.py b/test/aio/test_advisory_adobe_advisory.py index bbae0886..05bc1245 100644 --- a/test/aio/test_advisory_adobe_advisory.py +++ b/test/aio/test_advisory_adobe_advisory.py @@ -55,7 +55,7 @@ def make_instance(self, include_optional) -> AdvisoryAdobeAdvisory: date_added = '', link = '', solutions = [ - vulncheck_sdk.aio.models.advisory/adobe_solution.advisory.AdobeSolution( + vulncheck_sdk.aio.models.advisory/adobe_affected.advisory.AdobeAffected( platform = '', product = '', version = '', ) diff --git a/test/aio/test_advisory_adp_container.py b/test/aio/test_advisory_adp_container.py index dc27b84e..36c1abd6 100644 --- a/test/aio/test_advisory_adp_container.py +++ b/test/aio/test_advisory_adp_container.py @@ -100,7 +100,7 @@ def make_instance(self, include_optional) -> AdvisoryADPContainer: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -140,7 +140,7 @@ def make_instance(self, include_optional) -> AdvisoryADPContainer: content = vulncheck_sdk.aio.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.aio.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) diff --git a/test/aio/test_advisory_advisory_details.py b/test/aio/test_advisory_advisory_details.py index 2187c3f3..d4d427f6 100644 --- a/test/aio/test_advisory_advisory_details.py +++ b/test/aio/test_advisory_advisory_details.py @@ -40,15 +40,13 @@ def make_instance(self, include_optional) -> AdvisoryAdvisoryDetails: href = '', id = '', title = '', ), - cve = vulncheck_sdk.aio.models.advisory/oval_cve.advisory.OvalCVE( + cve = vulncheck_sdk.aio.models.advisory/bugzilla.advisory.Bugzilla( href = '', id = '', title = '', ), - issued = vulncheck_sdk.aio.models.advisory/issued.advisory.Issued( - date = '', ), + issued = None, severity = '', - updated = vulncheck_sdk.aio.models.advisory/updated.advisory.Updated( - date = '', ) + updated = None ) else: return AdvisoryAdvisoryDetails( diff --git a/test/aio/test_advisory_bdu_advisory.py b/test/aio/test_advisory_bdu_advisory.py index 6f0077d3..457ee201 100644 --- a/test/aio/test_advisory_bdu_advisory.py +++ b/test/aio/test_advisory_bdu_advisory.py @@ -44,7 +44,7 @@ def make_instance(self, include_optional) -> AdvisoryBDUAdvisory: vector = vulncheck_sdk.aio.models.advisory/bdu_vector.advisory.BDUVector( score = '', text = '', ), ), - cvss3 = vulncheck_sdk.aio.models.advisory/bdu_cvss3.advisory.BDUCvss3( + cvss3 = vulncheck_sdk.aio.models.advisory/bdu_cvss.advisory.BDUCvss( vector = vulncheck_sdk.aio.models.advisory/bdu_vector.advisory.BDUVector( score = '', text = '', ), ), diff --git a/test/aio/test_advisory_botnet.py b/test/aio/test_advisory_botnet.py index 8a674d42..aa0df0d5 100644 --- a/test/aio/test_advisory_botnet.py +++ b/test/aio/test_advisory_botnet.py @@ -96,7 +96,7 @@ def make_instance(self, include_optional) -> AdvisoryBotnet: vulncheck_sdk.aio.models.advisory/tool.advisory.Tool( name = '', references = [ - vulncheck_sdk.aio.models.advisory/tool_ref.advisory.ToolRef( + vulncheck_sdk.aio.models.advisory/mitre_attack_ref.advisory.MitreAttackRef( date_added = '', url = '', ) ], ) diff --git a/test/aio/test_advisory_cisa_csaf_adv.py b/test/aio/test_advisory_cisa_csaf_adv.py index 4b91efb9..0c2e4ba4 100644 --- a/test/aio/test_advisory_cisa_csaf_adv.py +++ b/test/aio/test_advisory_cisa_csaf_adv.py @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryCisaCsafAdv: if include_optional: return AdvisoryCisaCsafAdv( csaf_json = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryCisaCsafAdv: text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryCisaCsafAdv: '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( @@ -112,7 +171,7 @@ def make_instance(self, include_optional) -> AdvisoryCisaCsafAdv: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_advisory_csaf.py b/test/aio/test_advisory_csaf.py index a5df1eb9..5dccf8f5 100644 --- a/test/aio/test_advisory_csaf.py +++ b/test/aio/test_advisory_csaf.py @@ -88,7 +88,9 @@ def make_instance(self, include_optional) -> AdvisoryCSAF: product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), relationships = [ vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( category = '', @@ -181,7 +183,7 @@ def make_instance(self, include_optional) -> AdvisoryCSAF: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_advisory_csaf_relationship.py b/test/aio/test_advisory_csaf_relationship.py index bafddd1a..43697e28 100644 --- a/test/aio/test_advisory_csaf_relationship.py +++ b/test/aio/test_advisory_csaf_relationship.py @@ -40,7 +40,9 @@ def make_instance(self, include_optional) -> AdvisoryCSAFRelationship: full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), product_reference = '', relates_to_product_reference = '' ) diff --git a/test/aio/test_advisory_csaf_score.py b/test/aio/test_advisory_csaf_score.py index f95f3a57..a60b9786 100644 --- a/test/aio/test_advisory_csaf_score.py +++ b/test/aio/test_advisory_csaf_score.py @@ -54,7 +54,7 @@ def make_instance(self, include_optional) -> AdvisoryCSAFScore: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_advisory_csaf_vulnerability.py b/test/aio/test_advisory_csaf_vulnerability.py index 0d1f912a..f142584b 100644 --- a/test/aio/test_advisory_csaf_vulnerability.py +++ b/test/aio/test_advisory_csaf_vulnerability.py @@ -113,7 +113,7 @@ def make_instance(self, include_optional) -> AdvisoryCSAFVulnerability: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_advisory_cvrf.py b/test/aio/test_advisory_cvrf.py index cc97a264..aaab0c4e 100644 --- a/test/aio/test_advisory_cvrf.py +++ b/test/aio/test_advisory_cvrf.py @@ -38,72 +38,6 @@ def make_instance(self, include_optional) -> AdvisoryCvrf: return AdvisoryCvrf( cve = [ '' - ], - notes = [ - vulncheck_sdk.aio.models.advisory/document_note.advisory.DocumentNote( - text = '', - title = '', - type = '', ) - ], - product_tree = vulncheck_sdk.aio.models.advisory/product_tree.advisory.ProductTree( - relationships = [ - vulncheck_sdk.aio.models.advisory/relationship.advisory.Relationship( - product_reference = '', - relates_to_product_reference = '', - relation_type = '', ) - ], ), - references = [ - vulncheck_sdk.aio.models.advisory/cvrf_reference.advisory.CVRFReference( - description = '', - url = '', ) - ], - title = '', - tracking = vulncheck_sdk.aio.models.advisory/document_tracking.advisory.DocumentTracking( - current_release_date = '', - id = '', - initial_release_date = '', - revision_history = [ - vulncheck_sdk.aio.models.advisory/revision.advisory.Revision( - date = '', - description = '', - number = '', ) - ], - status = '', - version = '', ), - vulnerabilities = [ - vulncheck_sdk.aio.models.advisory/vulnerability.advisory.Vulnerability( - cve = '', - cvssscore_sets = vulncheck_sdk.aio.models.advisory/score_set.advisory.ScoreSet( - base_score = '', - vector = '', ), - description = '', - packages = [ - vulncheck_sdk.aio.models.advisory/vuln_check_package.advisory.VulnCheckPackage( - arch = '', - distro = '', - filename = '', - md5 = '', - name = '', - purl = '', - version = '', ) - ], - product_statuses = [ - vulncheck_sdk.aio.models.advisory/status.advisory.Status( - product_id = [ - '' - ], - type = '', ) - ], - references = [ - vulncheck_sdk.aio.models.advisory/cvrf_reference.advisory.CVRFReference( - description = '', - url = '', ) - ], - threats = [ - vulncheck_sdk.aio.models.advisory/threat.advisory.Threat( - severity = '', - type = '', ) - ], ) ] ) else: diff --git a/test/aio/test_advisory_cvrf_reference.py b/test/aio/test_advisory_cvrf_reference.py deleted file mode 100644 index e09eead9..00000000 --- a/test/aio/test_advisory_cvrf_reference.py +++ /dev/null @@ -1,53 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_cvrf_reference import AdvisoryCVRFReference - -class TestAdvisoryCVRFReference(unittest.TestCase): - """AdvisoryCVRFReference unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryCVRFReference: - """Test AdvisoryCVRFReference - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryCVRFReference` - """ - model = AdvisoryCVRFReference() - if include_optional: - return AdvisoryCVRFReference( - description = '', - url = '' - ) - else: - return AdvisoryCVRFReference( - ) - """ - - def testAdvisoryCVRFReference(self): - """Test AdvisoryCVRFReference""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_cwe_node.py b/test/aio/test_advisory_cwe_node.py deleted file mode 100644 index 7a5b09d5..00000000 --- a/test/aio/test_advisory_cwe_node.py +++ /dev/null @@ -1,55 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_cwe_node import AdvisoryCWENode - -class TestAdvisoryCWENode(unittest.TestCase): - """AdvisoryCWENode unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryCWENode: - """Test AdvisoryCWENode - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryCWENode` - """ - model = AdvisoryCWENode() - if include_optional: - return AdvisoryCWENode( - cweid = '', - description = '', - id = '', - name = '' - ) - else: - return AdvisoryCWENode( - ) - """ - - def testAdvisoryCWENode(self): - """Test AdvisoryCWENode""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_cwes.py b/test/aio/test_advisory_cwes.py index 4ab3661a..7e6e8fc0 100644 --- a/test/aio/test_advisory_cwes.py +++ b/test/aio/test_advisory_cwes.py @@ -37,13 +37,8 @@ def make_instance(self, include_optional) -> AdvisoryCwes: if include_optional: return AdvisoryCwes( nodes = [ - vulncheck_sdk.aio.models.advisory/cwe_node.advisory.CWENode( - cweid = '', - description = '', - id = '', - name = '', ) - ], - total_count = 56 + vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution() + ] ) else: return AdvisoryCwes( diff --git a/test/aio/test_advisory_date_time.py b/test/aio/test_advisory_date_time.py deleted file mode 100644 index 08435a51..00000000 --- a/test/aio/test_advisory_date_time.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_date_time import AdvisoryDateTime - -class TestAdvisoryDateTime(unittest.TestCase): - """AdvisoryDateTime unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryDateTime: - """Test AdvisoryDateTime - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryDateTime` - """ - model = AdvisoryDateTime() - if include_optional: - return AdvisoryDateTime( - var_date = '' - ) - else: - return AdvisoryDateTime( - ) - """ - - def testAdvisoryDateTime(self): - """Test AdvisoryDateTime""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_debian_security_advisory.py b/test/aio/test_advisory_debian_security_advisory.py index fae102ef..ddf3556c 100644 --- a/test/aio/test_advisory_debian_security_advisory.py +++ b/test/aio/test_advisory_debian_security_advisory.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> AdvisoryDebianSecurityAdvisory: if include_optional: return AdvisoryDebianSecurityAdvisory( affected_packages = [ - vulncheck_sdk.aio.models.advisory/affected_debian_package.advisory.AffectedDebianPackage( + vulncheck_sdk.aio.models.advisory/vulnerable_product.advisory.VulnerableProduct( name = '', version = '', ) ], diff --git a/test/aio/test_advisory_dell.py b/test/aio/test_advisory_dell.py index 5168517e..0dccd191 100644 --- a/test/aio/test_advisory_dell.py +++ b/test/aio/test_advisory_dell.py @@ -43,7 +43,7 @@ def make_instance(self, include_optional) -> AdvisoryDell: ], date_added = '', dell_cves = [ - vulncheck_sdk.aio.models.advisory/dell_cve.advisory.DellCVE( + vulncheck_sdk.aio.models.advisory/adobe_cve.advisory.AdobeCVE( cve = '', cvss_score = '', cvss_vector = '', ) diff --git a/test/aio/test_advisory_document_note.py b/test/aio/test_advisory_document_note.py deleted file mode 100644 index 0d8a976c..00000000 --- a/test/aio/test_advisory_document_note.py +++ /dev/null @@ -1,54 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_document_note import AdvisoryDocumentNote - -class TestAdvisoryDocumentNote(unittest.TestCase): - """AdvisoryDocumentNote unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryDocumentNote: - """Test AdvisoryDocumentNote - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryDocumentNote` - """ - model = AdvisoryDocumentNote() - if include_optional: - return AdvisoryDocumentNote( - text = '', - title = '', - type = '' - ) - else: - return AdvisoryDocumentNote( - ) - """ - - def testAdvisoryDocumentNote(self): - """Test AdvisoryDocumentNote""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_document_tracking.py b/test/aio/test_advisory_document_tracking.py deleted file mode 100644 index c60e1af6..00000000 --- a/test/aio/test_advisory_document_tracking.py +++ /dev/null @@ -1,62 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_document_tracking import AdvisoryDocumentTracking - -class TestAdvisoryDocumentTracking(unittest.TestCase): - """AdvisoryDocumentTracking unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryDocumentTracking: - """Test AdvisoryDocumentTracking - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryDocumentTracking` - """ - model = AdvisoryDocumentTracking() - if include_optional: - return AdvisoryDocumentTracking( - current_release_date = '', - id = '', - initial_release_date = '', - revision_history = [ - vulncheck_sdk.aio.models.advisory/revision.advisory.Revision( - date = '', - description = '', - number = '', ) - ], - status = '', - version = '' - ) - else: - return AdvisoryDocumentTracking( - ) - """ - - def testAdvisoryDocumentTracking(self): - """Test AdvisoryDocumentTracking""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_end_of_life.py b/test/aio/test_advisory_end_of_life.py index 59b4c1b8..43d3b0bd 100644 --- a/test/aio/test_advisory_end_of_life.py +++ b/test/aio/test_advisory_end_of_life.py @@ -43,16 +43,16 @@ def make_instance(self, include_optional) -> AdvisoryEndOfLife: vulncheck_sdk.aio.models.advisory/cycle.advisory.Cycle( codename = '', cycle = '', - discontinued = vulncheck_sdk.aio.models.discontinued.discontinued(), - eol = vulncheck_sdk.aio.models.eol.eol(), - extended_support = vulncheck_sdk.aio.models.extended_support.extendedSupport(), + discontinued = null, + eol = null, + extended_support = null, latest = '', latest_release_date = '', link = '', - lts = vulncheck_sdk.aio.models.lts.lts(), + lts = null, release_date = '', release_label = '', - support = vulncheck_sdk.aio.models.support.support(), ) + support = null, ) ], date_added = '', name = '', diff --git a/test/aio/test_advisory_gh_advisory_json_lean.py b/test/aio/test_advisory_gh_advisory_json_lean.py index 48168a2d..3a637c1d 100644 --- a/test/aio/test_advisory_gh_advisory_json_lean.py +++ b/test/aio/test_advisory_gh_advisory_json_lean.py @@ -45,13 +45,8 @@ def make_instance(self, include_optional) -> AdvisoryGHAdvisoryJSONLean: vector_string = '', ), cwes = vulncheck_sdk.aio.models.advisory/cwes.advisory.Cwes( nodes = [ - vulncheck_sdk.aio.models.advisory/cwe_node.advisory.CWENode( - cweid = '', - description = '', - id = '', - name = '', ) - ], - total_count = 56, ), + vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution() + ], ), database_id = 56, date_added = '', description = '', @@ -76,7 +71,7 @@ def make_instance(self, include_optional) -> AdvisoryGHAdvisoryJSONLean: vulnerabilities = vulncheck_sdk.aio.models.advisory/gh_vulnerabilities.advisory.GHVulnerabilities( nodes = [ vulncheck_sdk.aio.models.advisory/gh_node.advisory.GHNode( - package = vulncheck_sdk.aio.models.advisory/gh_package.advisory.GHPackage( + package = vulncheck_sdk.aio.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), severity = '', diff --git a/test/aio/test_advisory_gh_node.py b/test/aio/test_advisory_gh_node.py index 15abf624..a2b3b0c9 100644 --- a/test/aio/test_advisory_gh_node.py +++ b/test/aio/test_advisory_gh_node.py @@ -36,7 +36,7 @@ def make_instance(self, include_optional) -> AdvisoryGHNode: model = AdvisoryGHNode() if include_optional: return AdvisoryGHNode( - package = vulncheck_sdk.aio.models.advisory/gh_package.advisory.GHPackage( + package = vulncheck_sdk.aio.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), severity = '', diff --git a/test/aio/test_advisory_gh_vulnerabilities.py b/test/aio/test_advisory_gh_vulnerabilities.py index 3fe08426..fa9c722f 100644 --- a/test/aio/test_advisory_gh_vulnerabilities.py +++ b/test/aio/test_advisory_gh_vulnerabilities.py @@ -38,7 +38,7 @@ def make_instance(self, include_optional) -> AdvisoryGHVulnerabilities: return AdvisoryGHVulnerabilities( nodes = [ vulncheck_sdk.aio.models.advisory/gh_node.advisory.GHNode( - package = vulncheck_sdk.aio.models.advisory/gh_package.advisory.GHPackage( + package = vulncheck_sdk.aio.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), severity = '', diff --git a/test/aio/test_advisory_ghsa.py b/test/aio/test_advisory_ghsa.py index de5513f8..0305890d 100644 --- a/test/aio/test_advisory_ghsa.py +++ b/test/aio/test_advisory_ghsa.py @@ -47,13 +47,13 @@ def make_instance(self, include_optional) -> AdvisoryGHSA: affected_functions = [ '' ], ), - package = vulncheck_sdk.aio.models.advisory/ghsa_package.advisory.GHSAPackage( + package = vulncheck_sdk.aio.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), ranges = [ vulncheck_sdk.aio.models.advisory/ghsa_range.advisory.GHSARange( events = [ - vulncheck_sdk.aio.models.advisory/ghsa_event.advisory.GHSAEvent( + vulncheck_sdk.aio.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], @@ -76,13 +76,13 @@ def make_instance(self, include_optional) -> AdvisoryGHSA: modified = '', published = '', references = [ - vulncheck_sdk.aio.models.advisory/ghsa_reference.advisory.GHSAReference( + vulncheck_sdk.aio.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], schema_version = '', severity = [ - vulncheck_sdk.aio.models.advisory/ghsa_severity.advisory.GHSASeverity( + vulncheck_sdk.aio.models.advisory/severity.advisory.Severity( score = '', type = '', ) ], diff --git a/test/aio/test_advisory_ghsa_affected.py b/test/aio/test_advisory_ghsa_affected.py index b3676623..c28be403 100644 --- a/test/aio/test_advisory_ghsa_affected.py +++ b/test/aio/test_advisory_ghsa_affected.py @@ -40,13 +40,13 @@ def make_instance(self, include_optional) -> AdvisoryGHSAAffected: affected_functions = [ '' ], ), - package = vulncheck_sdk.aio.models.advisory/ghsa_package.advisory.GHSAPackage( + package = vulncheck_sdk.aio.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), ranges = [ vulncheck_sdk.aio.models.advisory/ghsa_range.advisory.GHSARange( events = [ - vulncheck_sdk.aio.models.advisory/ghsa_event.advisory.GHSAEvent( + vulncheck_sdk.aio.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/aio/test_advisory_ghsa_range.py b/test/aio/test_advisory_ghsa_range.py index fc21a1d3..d974410d 100644 --- a/test/aio/test_advisory_ghsa_range.py +++ b/test/aio/test_advisory_ghsa_range.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> AdvisoryGHSARange: if include_optional: return AdvisoryGHSARange( events = [ - vulncheck_sdk.aio.models.advisory/ghsa_event.advisory.GHSAEvent( + vulncheck_sdk.aio.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/aio/test_advisory_go_vuln_affected.py b/test/aio/test_advisory_go_vuln_affected.py index 1948c3de..b345e394 100644 --- a/test/aio/test_advisory_go_vuln_affected.py +++ b/test/aio/test_advisory_go_vuln_affected.py @@ -36,7 +36,7 @@ def make_instance(self, include_optional) -> AdvisoryGoVulnAffected: model = AdvisoryGoVulnAffected() if include_optional: return AdvisoryGoVulnAffected( - database_specific = vulncheck_sdk.aio.models.advisory/go_vuln_database_specific.advisory.GoVulnDatabaseSpecific( + database_specific = vulncheck_sdk.aio.models.advisory/gh_reference.advisory.GHReference( url = '', ), ecosystem_specific = vulncheck_sdk.aio.models.advisory/go_vuln_ecosystem_specific.advisory.GoVulnEcosystemSpecific( imports = [ @@ -46,13 +46,13 @@ def make_instance(self, include_optional) -> AdvisoryGoVulnAffected: '' ], ) ], ), - package = vulncheck_sdk.aio.models.advisory/go_vuln_package.advisory.GoVulnPackage( + package = vulncheck_sdk.aio.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), ranges = [ vulncheck_sdk.aio.models.advisory/go_vuln_ranges.advisory.GoVulnRanges( events = [ - vulncheck_sdk.aio.models.advisory/go_event.advisory.GoEvent( + vulncheck_sdk.aio.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/aio/test_advisory_go_vuln_json.py b/test/aio/test_advisory_go_vuln_json.py index f899eb76..d7e85fa3 100644 --- a/test/aio/test_advisory_go_vuln_json.py +++ b/test/aio/test_advisory_go_vuln_json.py @@ -39,7 +39,7 @@ def make_instance(self, include_optional) -> AdvisoryGoVulnJSON: advisory_url = '', affected = [ vulncheck_sdk.aio.models.advisory/go_vuln_affected.advisory.GoVulnAffected( - database_specific = vulncheck_sdk.aio.models.advisory/go_vuln_database_specific.advisory.GoVulnDatabaseSpecific( + database_specific = vulncheck_sdk.aio.models.advisory/gh_reference.advisory.GHReference( url = '', ), ecosystem_specific = vulncheck_sdk.aio.models.advisory/go_vuln_ecosystem_specific.advisory.GoVulnEcosystemSpecific( imports = [ @@ -49,13 +49,13 @@ def make_instance(self, include_optional) -> AdvisoryGoVulnJSON: '' ], ) ], ), - package = vulncheck_sdk.aio.models.advisory/go_vuln_package.advisory.GoVulnPackage( + package = vulncheck_sdk.aio.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), ranges = [ vulncheck_sdk.aio.models.advisory/go_vuln_ranges.advisory.GoVulnRanges( events = [ - vulncheck_sdk.aio.models.advisory/go_event.advisory.GoEvent( + vulncheck_sdk.aio.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], @@ -81,7 +81,7 @@ def make_instance(self, include_optional) -> AdvisoryGoVulnJSON: modified = '', published = '', references = [ - vulncheck_sdk.aio.models.advisory/go_vuln_reference.advisory.GoVulnReference( + vulncheck_sdk.aio.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ] diff --git a/test/aio/test_advisory_go_vuln_ranges.py b/test/aio/test_advisory_go_vuln_ranges.py index 66153f66..4e08facf 100644 --- a/test/aio/test_advisory_go_vuln_ranges.py +++ b/test/aio/test_advisory_go_vuln_ranges.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> AdvisoryGoVulnRanges: if include_optional: return AdvisoryGoVulnRanges( events = [ - vulncheck_sdk.aio.models.advisory/go_event.advisory.GoEvent( + vulncheck_sdk.aio.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/aio/test_advisory_haskell_affected.py b/test/aio/test_advisory_haskell_affected.py index e551e67b..52587a4e 100644 --- a/test/aio/test_advisory_haskell_affected.py +++ b/test/aio/test_advisory_haskell_affected.py @@ -38,7 +38,7 @@ def make_instance(self, include_optional) -> AdvisoryHaskellAffected: return AdvisoryHaskellAffected( affected_constraint = '', affected_versions = [ - vulncheck_sdk.aio.models.advisory/haskell_version.advisory.HaskellVersion( + vulncheck_sdk.aio.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/aio/test_advisory_haskell_sadb_advisory.py b/test/aio/test_advisory_haskell_sadb_advisory.py index 4f26e39e..5aa96e58 100644 --- a/test/aio/test_advisory_haskell_sadb_advisory.py +++ b/test/aio/test_advisory_haskell_sadb_advisory.py @@ -41,7 +41,7 @@ def make_instance(self, include_optional) -> AdvisoryHaskellSADBAdvisory: vulncheck_sdk.aio.models.advisory/haskell_affected.advisory.HaskellAffected( affected_constraint = '', affected_versions = [ - vulncheck_sdk.aio.models.advisory/haskell_version.advisory.HaskellVersion( + vulncheck_sdk.aio.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/aio/test_advisory_issued.py b/test/aio/test_advisory_issued.py deleted file mode 100644 index da00d429..00000000 --- a/test/aio/test_advisory_issued.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_issued import AdvisoryIssued - -class TestAdvisoryIssued(unittest.TestCase): - """AdvisoryIssued unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryIssued: - """Test AdvisoryIssued - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryIssued` - """ - model = AdvisoryIssued() - if include_optional: - return AdvisoryIssued( - var_date = '' - ) - else: - return AdvisoryIssued( - ) - """ - - def testAdvisoryIssued(self): - """Test AdvisoryIssued""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_lol_advs.py b/test/aio/test_advisory_lol_advs.py index da9dc6cc..3446796d 100644 --- a/test/aio/test_advisory_lol_advs.py +++ b/test/aio/test_advisory_lol_advs.py @@ -43,7 +43,7 @@ def make_instance(self, include_optional) -> AdvisoryLolAdvs: description = '', id = '', lol_json = { - 'key' : None + 'key' : null }, mitre_id = '', references = [ diff --git a/test/aio/test_advisory_m_cna.py b/test/aio/test_advisory_m_cna.py index a0d890d9..5dccde5f 100644 --- a/test/aio/test_advisory_m_cna.py +++ b/test/aio/test_advisory_m_cna.py @@ -66,7 +66,7 @@ def make_instance(self, include_optional) -> AdvisoryMCna: nodes = [ vulncheck_sdk.aio.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.aio.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.aio.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', @@ -125,7 +125,7 @@ def make_instance(self, include_optional) -> AdvisoryMCna: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -165,7 +165,7 @@ def make_instance(self, include_optional) -> AdvisoryMCna: content = vulncheck_sdk.aio.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.aio.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) diff --git a/test/aio/test_advisory_m_containers.py b/test/aio/test_advisory_m_containers.py index 9a233a5f..88485e8f 100644 --- a/test/aio/test_advisory_m_containers.py +++ b/test/aio/test_advisory_m_containers.py @@ -97,7 +97,7 @@ def make_instance(self, include_optional) -> AdvisoryMContainers: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -137,7 +137,7 @@ def make_instance(self, include_optional) -> AdvisoryMContainers: content = vulncheck_sdk.aio.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.aio.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) @@ -145,7 +145,10 @@ def make_instance(self, include_optional) -> AdvisoryMContainers: problem_types = [ vulncheck_sdk.aio.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.aio.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.aio.models.advisory/m_reference.advisory.MReference( name = '', @@ -190,7 +193,7 @@ def make_instance(self, include_optional) -> AdvisoryMContainers: nodes = [ vulncheck_sdk.aio.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.aio.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.aio.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', @@ -244,7 +247,7 @@ def make_instance(self, include_optional) -> AdvisoryMContainers: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -284,7 +287,7 @@ def make_instance(self, include_optional) -> AdvisoryMContainers: content = vulncheck_sdk.aio.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.aio.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) diff --git a/test/aio/test_advisory_m_nodes.py b/test/aio/test_advisory_m_nodes.py index de82a84c..63c747d7 100644 --- a/test/aio/test_advisory_m_nodes.py +++ b/test/aio/test_advisory_m_nodes.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> AdvisoryMNodes: if include_optional: return AdvisoryMNodes( cpe_match = [ - vulncheck_sdk.aio.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.aio.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', diff --git a/test/aio/test_advisory_malicious_package.py b/test/aio/test_advisory_malicious_package.py index 2843a618..4de77cb8 100644 --- a/test/aio/test_advisory_malicious_package.py +++ b/test/aio/test_advisory_malicious_package.py @@ -44,8 +44,8 @@ def make_instance(self, include_optional) -> AdvisoryMaliciousPackage: malware = vulncheck_sdk.aio.models.advisory/osv_obj.advisory.OSVObj( affected = [ vulncheck_sdk.aio.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.aio.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.aio.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.aio.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', @@ -79,7 +79,7 @@ def make_instance(self, include_optional) -> AdvisoryMaliciousPackage: modified = '', published = '', references = [ - vulncheck_sdk.aio.models.advisory/osv_reference.advisory.OSVReference( + vulncheck_sdk.aio.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], diff --git a/test/aio/test_advisory_manage_engine.py b/test/aio/test_advisory_manage_engine.py index d81c0c07..9228c455 100644 --- a/test/aio/test_advisory_manage_engine.py +++ b/test/aio/test_advisory_manage_engine.py @@ -55,7 +55,7 @@ def make_instance(self, include_optional) -> AdvisoryManageEngine: display_value = '', ) ], product_specific_details = [ - vulncheck_sdk.aio.models.advisory/product_specific_detail.advisory.ProductSpecificDetail( + vulncheck_sdk.aio.models.advisory/me_product.advisory.MEProduct( id = '', display_value = '', ) ], diff --git a/test/aio/test_advisory_manage_engine_advisory.py b/test/aio/test_advisory_manage_engine_advisory.py index fe3a4e82..2af0afff 100644 --- a/test/aio/test_advisory_manage_engine_advisory.py +++ b/test/aio/test_advisory_manage_engine_advisory.py @@ -60,9 +60,7 @@ def make_instance(self, include_optional) -> AdvisoryManageEngineAdvisory: display_value = '', ) ], product_specific_details = [ - vulncheck_sdk.aio.models.advisory/product_specific_detail.advisory.ProductSpecificDetail( - id = '', - display_value = '', ) + ], summary = '', version = '', diff --git a/test/aio/test_advisory_mcpe_applicability.py b/test/aio/test_advisory_mcpe_applicability.py index 01105879..4dedf757 100644 --- a/test/aio/test_advisory_mcpe_applicability.py +++ b/test/aio/test_advisory_mcpe_applicability.py @@ -40,7 +40,7 @@ def make_instance(self, include_optional) -> AdvisoryMCPEApplicability: nodes = [ vulncheck_sdk.aio.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.aio.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.aio.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', diff --git a/test/aio/test_advisory_meta_data.py b/test/aio/test_advisory_meta_data.py index 807c81c6..6ffd6164 100644 --- a/test/aio/test_advisory_meta_data.py +++ b/test/aio/test_advisory_meta_data.py @@ -41,15 +41,13 @@ def make_instance(self, include_optional) -> AdvisoryMetaData: href = '', id = '', title = '', ), - cve = vulncheck_sdk.aio.models.advisory/oval_cve.advisory.OvalCVE( + cve = vulncheck_sdk.aio.models.advisory/bugzilla.advisory.Bugzilla( href = '', id = '', title = '', ), - issued = vulncheck_sdk.aio.models.advisory/issued.advisory.Issued( - date = '', ), + issued = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), severity = '', - updated = vulncheck_sdk.aio.models.advisory/updated.advisory.Updated( - date = '', ), ), + updated = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), ), cve = [ '' ], diff --git a/test/aio/test_advisory_metric.py b/test/aio/test_advisory_metric.py index 0f395c23..015d7a61 100644 --- a/test/aio/test_advisory_metric.py +++ b/test/aio/test_advisory_metric.py @@ -59,7 +59,7 @@ def make_instance(self, include_optional) -> AdvisoryMetric: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -99,7 +99,7 @@ def make_instance(self, include_optional) -> AdvisoryMetric: content = vulncheck_sdk.aio.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.aio.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ] diff --git a/test/aio/test_advisory_microsoft_csaf.py b/test/aio/test_advisory_microsoft_csaf.py index 27b087f9..2ce866c8 100644 --- a/test/aio/test_advisory_microsoft_csaf.py +++ b/test/aio/test_advisory_microsoft_csaf.py @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCSAF: if include_optional: return AdvisoryMicrosoftCSAF( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCSAF: text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCSAF: '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( @@ -112,7 +171,7 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCSAF: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_advisory_microsoft_cvrf.py b/test/aio/test_advisory_microsoft_cvrf.py index e80981c3..56afcf94 100644 --- a/test/aio/test_advisory_microsoft_cvrf.py +++ b/test/aio/test_advisory_microsoft_cvrf.py @@ -40,7 +40,7 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCVRF: '' ], cvrf = vulncheck_sdk.aio.models.advisory/mscvrf.advisory.MSCVRF( - document_title = vulncheck_sdk.aio.models.advisory/ms_document_title.advisory.MSDocumentTitle( + document_title = vulncheck_sdk.aio.models.advisory/i_val.advisory.IVal( value = '', ), document_tracking = vulncheck_sdk.aio.models.advisory/m_document_tracking.advisory.MDocumentTracking( current_release_date = '', @@ -48,8 +48,7 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCVRF: identification = vulncheck_sdk.aio.models.advisory/m_identification.advisory.MIdentification( alias = vulncheck_sdk.aio.models.advisory/i_val.advisory.IVal( value = '', ), - id = vulncheck_sdk.aio.models.advisory/i_val.advisory.IVal( - value = '', ), ), + id = , ), revisionhistory = [ vulncheck_sdk.aio.models.advisory/r_revision.advisory.RRevision( date = '', diff --git a/test/aio/test_advisory_mitre_cve_list_v5.py b/test/aio/test_advisory_mitre_cve_list_v5.py index cf836864..38141601 100644 --- a/test/aio/test_advisory_mitre_cve_list_v5.py +++ b/test/aio/test_advisory_mitre_cve_list_v5.py @@ -103,7 +103,7 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -143,7 +143,7 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5: content = vulncheck_sdk.aio.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.aio.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) @@ -151,7 +151,10 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5: problem_types = [ vulncheck_sdk.aio.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.aio.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.aio.models.advisory/m_reference.advisory.MReference( name = '', @@ -172,7 +175,7 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5: nodes = [ vulncheck_sdk.aio.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.aio.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.aio.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', @@ -192,10 +195,6 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5: type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.aio.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/aio/test_advisory_mitre_cve_list_v5_ref.py b/test/aio/test_advisory_mitre_cve_list_v5_ref.py index 17844657..619e081b 100644 --- a/test/aio/test_advisory_mitre_cve_list_v5_ref.py +++ b/test/aio/test_advisory_mitre_cve_list_v5_ref.py @@ -98,7 +98,7 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5Ref: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -138,7 +138,7 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5Ref: content = vulncheck_sdk.aio.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.aio.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) @@ -146,7 +146,10 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5Ref: problem_types = [ vulncheck_sdk.aio.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.aio.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.aio.models.advisory/m_reference.advisory.MReference( name = '', @@ -167,7 +170,7 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5Ref: nodes = [ vulncheck_sdk.aio.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.aio.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.aio.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', @@ -187,10 +190,6 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5Ref: type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.aio.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/aio/test_advisory_mscvrf.py b/test/aio/test_advisory_mscvrf.py index 7393822b..02727c13 100644 --- a/test/aio/test_advisory_mscvrf.py +++ b/test/aio/test_advisory_mscvrf.py @@ -36,7 +36,7 @@ def make_instance(self, include_optional) -> AdvisoryMSCVRF: model = AdvisoryMSCVRF() if include_optional: return AdvisoryMSCVRF( - document_title = vulncheck_sdk.aio.models.advisory/ms_document_title.advisory.MSDocumentTitle( + document_title = vulncheck_sdk.aio.models.advisory/i_val.advisory.IVal( value = '', ), document_tracking = vulncheck_sdk.aio.models.advisory/m_document_tracking.advisory.MDocumentTracking( current_release_date = '', diff --git a/test/aio/test_advisory_ncsc.py b/test/aio/test_advisory_ncsc.py index 88760990..a2593781 100644 --- a/test/aio/test_advisory_ncsc.py +++ b/test/aio/test_advisory_ncsc.py @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryNCSC: if include_optional: return AdvisoryNCSC( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryNCSC: text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryNCSC: '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( @@ -112,7 +171,7 @@ def make_instance(self, include_optional) -> AdvisoryNCSC: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_advisory_ncsccve.py b/test/aio/test_advisory_ncsccve.py index fea1b761..7e630cb2 100644 --- a/test/aio/test_advisory_ncsccve.py +++ b/test/aio/test_advisory_ncsccve.py @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryNCSCCVE: if include_optional: return AdvisoryNCSCCVE( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryNCSCCVE: text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryNCSCCVE: '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( @@ -112,7 +171,7 @@ def make_instance(self, include_optional) -> AdvisoryNCSCCVE: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_advisory_nvd20_source.py b/test/aio/test_advisory_nvd20_source.py index 0ffe640a..5bdf5153 100644 --- a/test/aio/test_advisory_nvd20_source.py +++ b/test/aio/test_advisory_nvd20_source.py @@ -46,7 +46,7 @@ def make_instance(self, include_optional) -> AdvisoryNVD20Source: source_identifiers = [ '' ], - v3_acceptance_level = vulncheck_sdk.aio.models.advisory/v3_acceptance_level.advisory.V3AcceptanceLevel( + v3_acceptance_level = vulncheck_sdk.aio.models.advisory/cwe_acceptance_level.advisory.CweAcceptanceLevel( description = '', last_modified = '', ) ) diff --git a/test/aio/test_advisory_open_jdk.py b/test/aio/test_advisory_open_jdk.py index 582184e2..010bd660 100644 --- a/test/aio/test_advisory_open_jdk.py +++ b/test/aio/test_advisory_open_jdk.py @@ -41,7 +41,7 @@ def make_instance(self, include_optional) -> AdvisoryOpenJDK: ], date_added = '', openjdk_cves = [ - vulncheck_sdk.aio.models.advisory/open_jdkcve.advisory.OpenJDKCVE( + vulncheck_sdk.aio.models.advisory/adobe_cve.advisory.AdobeCVE( cve = '', cvss_score = '', cvss_vector = '', ) diff --git a/test/aio/test_advisory_oracle_cpucsaf.py b/test/aio/test_advisory_oracle_cpucsaf.py index 2d3ae61c..f3787a19 100644 --- a/test/aio/test_advisory_oracle_cpucsaf.py +++ b/test/aio/test_advisory_oracle_cpucsaf.py @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryOracleCPUCSAF: if include_optional: return AdvisoryOracleCPUCSAF( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryOracleCPUCSAF: text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryOracleCPUCSAF: '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( @@ -112,7 +171,7 @@ def make_instance(self, include_optional) -> AdvisoryOracleCPUCSAF: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_advisory_original_ghsa.py b/test/aio/test_advisory_original_ghsa.py index bd436184..4dd61b6c 100644 --- a/test/aio/test_advisory_original_ghsa.py +++ b/test/aio/test_advisory_original_ghsa.py @@ -42,13 +42,13 @@ def make_instance(self, include_optional) -> AdvisoryOriginalGHSA: affected_functions = [ '' ], ), - package = vulncheck_sdk.aio.models.advisory/ghsa_package.advisory.GHSAPackage( + package = vulncheck_sdk.aio.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), ranges = [ vulncheck_sdk.aio.models.advisory/ghsa_range.advisory.GHSARange( events = [ - vulncheck_sdk.aio.models.advisory/ghsa_event.advisory.GHSAEvent( + vulncheck_sdk.aio.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], @@ -71,13 +71,13 @@ def make_instance(self, include_optional) -> AdvisoryOriginalGHSA: modified = '', published = '', references = [ - vulncheck_sdk.aio.models.advisory/ghsa_reference.advisory.GHSAReference( + vulncheck_sdk.aio.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], schema_version = '', severity = [ - vulncheck_sdk.aio.models.advisory/ghsa_severity.advisory.GHSASeverity( + vulncheck_sdk.aio.models.advisory/severity.advisory.Severity( score = '', type = '', ) ], diff --git a/test/aio/test_advisory_osv.py b/test/aio/test_advisory_osv.py index 83beb30d..b53e9a95 100644 --- a/test/aio/test_advisory_osv.py +++ b/test/aio/test_advisory_osv.py @@ -44,8 +44,8 @@ def make_instance(self, include_optional) -> AdvisoryOSV: osv = vulncheck_sdk.aio.models.advisory/osv_obj.advisory.OSVObj( affected = [ vulncheck_sdk.aio.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.aio.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.aio.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.aio.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', @@ -79,7 +79,7 @@ def make_instance(self, include_optional) -> AdvisoryOSV: modified = '', published = '', references = [ - vulncheck_sdk.aio.models.advisory/osv_reference.advisory.OSVReference( + vulncheck_sdk.aio.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], diff --git a/test/aio/test_advisory_osv_obj.py b/test/aio/test_advisory_osv_obj.py index 9e9432ea..ef71812a 100644 --- a/test/aio/test_advisory_osv_obj.py +++ b/test/aio/test_advisory_osv_obj.py @@ -38,8 +38,8 @@ def make_instance(self, include_optional) -> AdvisoryOSVObj: return AdvisoryOSVObj( affected = [ vulncheck_sdk.aio.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.aio.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.aio.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.aio.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', @@ -73,7 +73,7 @@ def make_instance(self, include_optional) -> AdvisoryOSVObj: modified = '', published = '', references = [ - vulncheck_sdk.aio.models.advisory/osv_reference.advisory.OSVReference( + vulncheck_sdk.aio.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], diff --git a/test/aio/test_advisory_product.py b/test/aio/test_advisory_product.py index 915e1c76..9d545a55 100644 --- a/test/aio/test_advisory_product.py +++ b/test/aio/test_advisory_product.py @@ -38,7 +38,9 @@ def make_instance(self, include_optional) -> AdvisoryProduct: return AdvisoryProduct( name = '', product_id = '', - product_identification_helper = { } + product_identification_helper = { + 'key' : null + } ) else: return AdvisoryProduct( diff --git a/test/aio/test_advisory_product_branch.py b/test/aio/test_advisory_product_branch.py index b44a7660..4592774e 100644 --- a/test/aio/test_advisory_product_branch.py +++ b/test/aio/test_advisory_product_branch.py @@ -43,14 +43,18 @@ def make_instance(self, include_optional) -> AdvisoryProductBranch: product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), relationships = [ vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( category = '', full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), product_reference = '', relates_to_product_reference = '', ) ], ) @@ -60,14 +64,18 @@ def make_instance(self, include_optional) -> AdvisoryProductBranch: product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), relationships = [ vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( category = '', full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), product_reference = '', relates_to_product_reference = '', ) ] diff --git a/test/aio/test_advisory_product_tree.py b/test/aio/test_advisory_product_tree.py deleted file mode 100644 index 530e41eb..00000000 --- a/test/aio/test_advisory_product_tree.py +++ /dev/null @@ -1,57 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_product_tree import AdvisoryProductTree - -class TestAdvisoryProductTree(unittest.TestCase): - """AdvisoryProductTree unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryProductTree: - """Test AdvisoryProductTree - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryProductTree` - """ - model = AdvisoryProductTree() - if include_optional: - return AdvisoryProductTree( - relationships = [ - vulncheck_sdk.aio.models.advisory/relationship.advisory.Relationship( - product_reference = '', - relates_to_product_reference = '', - relation_type = '', ) - ] - ) - else: - return AdvisoryProductTree( - ) - """ - - def testAdvisoryProductTree(self): - """Test AdvisoryProductTree""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_py_pa_advisory.py b/test/aio/test_advisory_py_pa_advisory.py index a10c5139..85b99080 100644 --- a/test/aio/test_advisory_py_pa_advisory.py +++ b/test/aio/test_advisory_py_pa_advisory.py @@ -39,14 +39,14 @@ def make_instance(self, include_optional) -> AdvisoryPyPAAdvisory: advisory_id = '', affected = [ vulncheck_sdk.aio.models.advisory/py_pa_affected.advisory.PyPAAffected( - package = vulncheck_sdk.aio.models.advisory/py_pa_package.advisory.PyPAPackage( + package = vulncheck_sdk.aio.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', purl = '', ), ranges = [ vulncheck_sdk.aio.models.advisory/py_pa_range.advisory.PyPARange( events = [ - vulncheck_sdk.aio.models.advisory/py_pa_event.advisory.PyPAEvent( + vulncheck_sdk.aio.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/aio/test_advisory_py_pa_affected.py b/test/aio/test_advisory_py_pa_affected.py index 75ceea92..2ee7d6f0 100644 --- a/test/aio/test_advisory_py_pa_affected.py +++ b/test/aio/test_advisory_py_pa_affected.py @@ -36,14 +36,14 @@ def make_instance(self, include_optional) -> AdvisoryPyPAAffected: model = AdvisoryPyPAAffected() if include_optional: return AdvisoryPyPAAffected( - package = vulncheck_sdk.aio.models.advisory/py_pa_package.advisory.PyPAPackage( + package = vulncheck_sdk.aio.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', purl = '', ), ranges = [ vulncheck_sdk.aio.models.advisory/py_pa_range.advisory.PyPARange( events = [ - vulncheck_sdk.aio.models.advisory/py_pa_event.advisory.PyPAEvent( + vulncheck_sdk.aio.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/aio/test_advisory_py_pa_range.py b/test/aio/test_advisory_py_pa_range.py index c6829110..ca475804 100644 --- a/test/aio/test_advisory_py_pa_range.py +++ b/test/aio/test_advisory_py_pa_range.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> AdvisoryPyPARange: if include_optional: return AdvisoryPyPARange( events = [ - vulncheck_sdk.aio.models.advisory/py_pa_event.advisory.PyPAEvent( + vulncheck_sdk.aio.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/aio/test_advisory_ransomware_exploit.py b/test/aio/test_advisory_ransomware_exploit.py index 4b7c7967..e0e82a29 100644 --- a/test/aio/test_advisory_ransomware_exploit.py +++ b/test/aio/test_advisory_ransomware_exploit.py @@ -96,7 +96,7 @@ def make_instance(self, include_optional) -> AdvisoryRansomwareExploit: vulncheck_sdk.aio.models.advisory/tool.advisory.Tool( name = '', references = [ - vulncheck_sdk.aio.models.advisory/tool_ref.advisory.ToolRef( + vulncheck_sdk.aio.models.advisory/mitre_attack_ref.advisory.MitreAttackRef( date_added = '', url = '', ) ], ) diff --git a/test/aio/test_advisory_relationship.py b/test/aio/test_advisory_relationship.py deleted file mode 100644 index d3184cb4..00000000 --- a/test/aio/test_advisory_relationship.py +++ /dev/null @@ -1,54 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_relationship import AdvisoryRelationship - -class TestAdvisoryRelationship(unittest.TestCase): - """AdvisoryRelationship unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryRelationship: - """Test AdvisoryRelationship - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryRelationship` - """ - model = AdvisoryRelationship() - if include_optional: - return AdvisoryRelationship( - product_reference = '', - relates_to_product_reference = '', - relation_type = '' - ) - else: - return AdvisoryRelationship( - ) - """ - - def testAdvisoryRelationship(self): - """Test AdvisoryRelationship""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_revision.py b/test/aio/test_advisory_revision.py deleted file mode 100644 index 73183883..00000000 --- a/test/aio/test_advisory_revision.py +++ /dev/null @@ -1,54 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_revision import AdvisoryRevision - -class TestAdvisoryRevision(unittest.TestCase): - """AdvisoryRevision unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryRevision: - """Test AdvisoryRevision - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryRevision` - """ - model = AdvisoryRevision() - if include_optional: - return AdvisoryRevision( - var_date = '', - description = '', - number = '' - ) - else: - return AdvisoryRevision( - ) - """ - - def testAdvisoryRevision(self): - """Test AdvisoryRevision""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_rhel_cve.py b/test/aio/test_advisory_rhel_cve.py index 53014429..4621f1e0 100644 --- a/test/aio/test_advisory_rhel_cve.py +++ b/test/aio/test_advisory_rhel_cve.py @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryRhelCVE: if include_optional: return AdvisoryRhelCVE( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryRhelCVE: text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryRhelCVE: '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( @@ -112,7 +171,7 @@ def make_instance(self, include_optional) -> AdvisoryRhelCVE: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_advisory_roche.py b/test/aio/test_advisory_roche.py index a93bbfa4..1a185ec5 100644 --- a/test/aio/test_advisory_roche.py +++ b/test/aio/test_advisory_roche.py @@ -41,7 +41,7 @@ def make_instance(self, include_optional) -> AdvisoryRoche: ], date_added = '', roche_cves = [ - vulncheck_sdk.aio.models.advisory/roche_cve.advisory.RocheCVE( + vulncheck_sdk.aio.models.advisory/adobe_cve.advisory.AdobeCVE( cve = '', cvss_score = '', cvss_vector = '', ) diff --git a/test/aio/test_advisory_score_set.py b/test/aio/test_advisory_score_set.py deleted file mode 100644 index 195db6e2..00000000 --- a/test/aio/test_advisory_score_set.py +++ /dev/null @@ -1,53 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_score_set import AdvisoryScoreSet - -class TestAdvisoryScoreSet(unittest.TestCase): - """AdvisoryScoreSet unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryScoreSet: - """Test AdvisoryScoreSet - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryScoreSet` - """ - model = AdvisoryScoreSet() - if include_optional: - return AdvisoryScoreSet( - base_score = '', - vector = '' - ) - else: - return AdvisoryScoreSet( - ) - """ - - def testAdvisoryScoreSet(self): - """Test AdvisoryScoreSet""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_siemens_advisory.py b/test/aio/test_advisory_siemens_advisory.py index e1d710ea..2be3c3c9 100644 --- a/test/aio/test_advisory_siemens_advisory.py +++ b/test/aio/test_advisory_siemens_advisory.py @@ -77,7 +77,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensAdvisory: name = '', namespace = '', ), references = [ - vulncheck_sdk.aio.models.advisory/siemens_references.advisory.SiemensReferences( + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( category = '', summary = '', url = '', ) @@ -86,7 +86,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensAdvisory: tracking = vulncheck_sdk.aio.models.advisory/siemens_tracking.advisory.SiemensTracking( current_release_date = '', generator = vulncheck_sdk.aio.models.advisory/siemens_generator.advisory.SiemensGenerator( - engine = vulncheck_sdk.aio.models.advisory/siemens_engine.advisory.SiemensEngine( + engine = vulncheck_sdk.aio.models.advisory/vulnerable_product.advisory.VulnerableProduct( name = '', version = '', ), ), id = '', @@ -109,7 +109,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensAdvisory: vulnerabilities = [ vulncheck_sdk.aio.models.advisory/siemens_vulnerability.advisory.SiemensVulnerability( cve = '', - cwe = vulncheck_sdk.aio.models.advisory/siemens_cwe.advisory.SiemensCWE( + cwe = vulncheck_sdk.aio.models.advisory/cwe.advisory.Cwe( id = '', name = '', ), product_status = vulncheck_sdk.aio.models.advisory/siemens_product_status.advisory.SiemensProductStatus( diff --git a/test/aio/test_advisory_siemens_document.py b/test/aio/test_advisory_siemens_document.py index 260ec769..0eb21703 100644 --- a/test/aio/test_advisory_siemens_document.py +++ b/test/aio/test_advisory_siemens_document.py @@ -62,7 +62,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensDocument: name = '', namespace = '', ), references = [ - vulncheck_sdk.aio.models.advisory/siemens_references.advisory.SiemensReferences( + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( category = '', summary = '', url = '', ) @@ -71,7 +71,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensDocument: tracking = vulncheck_sdk.aio.models.advisory/siemens_tracking.advisory.SiemensTracking( current_release_date = '', generator = vulncheck_sdk.aio.models.advisory/siemens_generator.advisory.SiemensGenerator( - engine = vulncheck_sdk.aio.models.advisory/siemens_engine.advisory.SiemensEngine( + engine = vulncheck_sdk.aio.models.advisory/vulnerable_product.advisory.VulnerableProduct( name = '', version = '', ), ), id = '', diff --git a/test/aio/test_advisory_siemens_generator.py b/test/aio/test_advisory_siemens_generator.py index 32b4b2c6..ebba842c 100644 --- a/test/aio/test_advisory_siemens_generator.py +++ b/test/aio/test_advisory_siemens_generator.py @@ -36,7 +36,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensGenerator: model = AdvisorySiemensGenerator() if include_optional: return AdvisorySiemensGenerator( - engine = vulncheck_sdk.aio.models.advisory/siemens_engine.advisory.SiemensEngine( + engine = vulncheck_sdk.aio.models.advisory/vulnerable_product.advisory.VulnerableProduct( name = '', version = '', ) ) diff --git a/test/aio/test_advisory_siemens_tracking.py b/test/aio/test_advisory_siemens_tracking.py index d0843d53..8ca59f15 100644 --- a/test/aio/test_advisory_siemens_tracking.py +++ b/test/aio/test_advisory_siemens_tracking.py @@ -38,7 +38,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensTracking: return AdvisorySiemensTracking( current_release_date = '', generator = vulncheck_sdk.aio.models.advisory/siemens_generator.advisory.SiemensGenerator( - engine = vulncheck_sdk.aio.models.advisory/siemens_engine.advisory.SiemensEngine( + engine = vulncheck_sdk.aio.models.advisory/vulnerable_product.advisory.VulnerableProduct( name = '', version = '', ), ), id = '', diff --git a/test/aio/test_advisory_siemens_vulnerability.py b/test/aio/test_advisory_siemens_vulnerability.py index 9e003830..e4d586a5 100644 --- a/test/aio/test_advisory_siemens_vulnerability.py +++ b/test/aio/test_advisory_siemens_vulnerability.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensVulnerability: if include_optional: return AdvisorySiemensVulnerability( cve = '', - cwe = vulncheck_sdk.aio.models.advisory/siemens_cwe.advisory.SiemensCWE( + cwe = vulncheck_sdk.aio.models.advisory/cwe.advisory.Cwe( id = '', name = '', ), notes = [ @@ -51,7 +51,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensVulnerability: '' ], ), references = [ - vulncheck_sdk.aio.models.advisory/siemens_references.advisory.SiemensReferences( + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( category = '', summary = '', url = '', ) diff --git a/test/aio/test_advisory_sigma_rule.py b/test/aio/test_advisory_sigma_rule.py index 06935935..b5ae3909 100644 --- a/test/aio/test_advisory_sigma_rule.py +++ b/test/aio/test_advisory_sigma_rule.py @@ -47,7 +47,9 @@ def make_instance(self, include_optional) -> AdvisorySigmaRule: author = '', date = '', description = '', - detection = { }, + detection = { + 'key' : null + }, false_positives = [ '' ], diff --git a/test/aio/test_advisory_sigma_rule_rule.py b/test/aio/test_advisory_sigma_rule_rule.py index c1dc3d79..0c486762 100644 --- a/test/aio/test_advisory_sigma_rule_rule.py +++ b/test/aio/test_advisory_sigma_rule_rule.py @@ -39,7 +39,9 @@ def make_instance(self, include_optional) -> AdvisorySigmaRuleRule: author = '', var_date = '', description = '', - detection = { }, + detection = { + 'key' : null + }, false_positives = [ '' ], diff --git a/test/aio/test_advisory_ssa_source.py b/test/aio/test_advisory_ssa_source.py index 10ae869b..2dd870b2 100644 --- a/test/aio/test_advisory_ssa_source.py +++ b/test/aio/test_advisory_ssa_source.py @@ -63,7 +63,7 @@ def make_instance(self, include_optional) -> AdvisorySSASource: name = '', namespace = '', ), references = [ - vulncheck_sdk.aio.models.advisory/siemens_references.advisory.SiemensReferences( + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( category = '', summary = '', url = '', ) @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> AdvisorySSASource: tracking = vulncheck_sdk.aio.models.advisory/siemens_tracking.advisory.SiemensTracking( current_release_date = '', generator = vulncheck_sdk.aio.models.advisory/siemens_generator.advisory.SiemensGenerator( - engine = vulncheck_sdk.aio.models.advisory/siemens_engine.advisory.SiemensEngine( + engine = vulncheck_sdk.aio.models.advisory/vulnerable_product.advisory.VulnerableProduct( name = '', version = '', ), ), id = '', @@ -95,7 +95,7 @@ def make_instance(self, include_optional) -> AdvisorySSASource: vulnerabilities = [ vulncheck_sdk.aio.models.advisory/siemens_vulnerability.advisory.SiemensVulnerability( cve = '', - cwe = vulncheck_sdk.aio.models.advisory/siemens_cwe.advisory.SiemensCWE( + cwe = vulncheck_sdk.aio.models.advisory/cwe.advisory.Cwe( id = '', name = '', ), notes = [ @@ -109,7 +109,7 @@ def make_instance(self, include_optional) -> AdvisorySSASource: '' ], ), references = [ - vulncheck_sdk.aio.models.advisory/siemens_references.advisory.SiemensReferences( + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( category = '', summary = '', url = '', ) diff --git a/test/aio/test_advisory_status.py b/test/aio/test_advisory_status.py deleted file mode 100644 index 78ae9f56..00000000 --- a/test/aio/test_advisory_status.py +++ /dev/null @@ -1,55 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_status import AdvisoryStatus - -class TestAdvisoryStatus(unittest.TestCase): - """AdvisoryStatus unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryStatus: - """Test AdvisoryStatus - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryStatus` - """ - model = AdvisoryStatus() - if include_optional: - return AdvisoryStatus( - product_id = [ - '' - ], - type = '' - ) - else: - return AdvisoryStatus( - ) - """ - - def testAdvisoryStatus(self): - """Test AdvisoryStatus""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_threat.py b/test/aio/test_advisory_threat.py deleted file mode 100644 index 0e37f303..00000000 --- a/test/aio/test_advisory_threat.py +++ /dev/null @@ -1,53 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_threat import AdvisoryThreat - -class TestAdvisoryThreat(unittest.TestCase): - """AdvisoryThreat unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryThreat: - """Test AdvisoryThreat - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryThreat` - """ - model = AdvisoryThreat() - if include_optional: - return AdvisoryThreat( - severity = '', - type = '' - ) - else: - return AdvisoryThreat( - ) - """ - - def testAdvisoryThreat(self): - """Test AdvisoryThreat""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_threat_actor_with_external_objects.py b/test/aio/test_advisory_threat_actor_with_external_objects.py index 444b5218..14d99813 100644 --- a/test/aio/test_advisory_threat_actor_with_external_objects.py +++ b/test/aio/test_advisory_threat_actor_with_external_objects.py @@ -155,7 +155,7 @@ def make_instance(self, include_optional) -> AdvisoryThreatActorWithExternalObje vulncheck_sdk.aio.models.advisory/tool.advisory.Tool( name = '', references = [ - vulncheck_sdk.aio.models.advisory/tool_ref.advisory.ToolRef( + vulncheck_sdk.aio.models.advisory/mitre_attack_ref.advisory.MitreAttackRef( date_added = '', url = '', ) ], ) diff --git a/test/aio/test_advisory_tool.py b/test/aio/test_advisory_tool.py index 4b56291a..38e0779c 100644 --- a/test/aio/test_advisory_tool.py +++ b/test/aio/test_advisory_tool.py @@ -38,7 +38,7 @@ def make_instance(self, include_optional) -> AdvisoryTool: return AdvisoryTool( name = '', references = [ - vulncheck_sdk.aio.models.advisory/tool_ref.advisory.ToolRef( + vulncheck_sdk.aio.models.advisory/mitre_attack_ref.advisory.MitreAttackRef( date_added = '', url = '', ) ] diff --git a/test/aio/test_advisory_update.py b/test/aio/test_advisory_update.py index 18e32042..9cd7f1bc 100644 --- a/test/aio/test_advisory_update.py +++ b/test/aio/test_advisory_update.py @@ -42,8 +42,7 @@ def make_instance(self, include_optional) -> AdvisoryUpdate: date_added = '', description = '', id = '', - issued = vulncheck_sdk.aio.models.advisory/date_time.advisory.DateTime( - date = '', ), + issued = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), os_arch = '', os_version = '', packages = [ @@ -64,8 +63,7 @@ def make_instance(self, include_optional) -> AdvisoryUpdate: severity = '', title = '', type = '', - updated = vulncheck_sdk.aio.models.advisory/date_time.advisory.DateTime( - date = '', ) + updated = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution() ) else: return AdvisoryUpdate( diff --git a/test/aio/test_advisory_updated.py b/test/aio/test_advisory_updated.py deleted file mode 100644 index 8a357c74..00000000 --- a/test/aio/test_advisory_updated.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_updated import AdvisoryUpdated - -class TestAdvisoryUpdated(unittest.TestCase): - """AdvisoryUpdated unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryUpdated: - """Test AdvisoryUpdated - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryUpdated` - """ - model = AdvisoryUpdated() - if include_optional: - return AdvisoryUpdated( - var_date = '' - ) - else: - return AdvisoryUpdated( - ) - """ - - def testAdvisoryUpdated(self): - """Test AdvisoryUpdated""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_vde_advisory.py b/test/aio/test_advisory_vde_advisory.py index b314b664..2feddc8d 100644 --- a/test/aio/test_advisory_vde_advisory.py +++ b/test/aio/test_advisory_vde_advisory.py @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryVDEAdvisory: if include_optional: return AdvisoryVDEAdvisory( csaf_json = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryVDEAdvisory: text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryVDEAdvisory: '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( @@ -112,7 +171,7 @@ def make_instance(self, include_optional) -> AdvisoryVDEAdvisory: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_advisory_vuln_check_cve_list_v5.py b/test/aio/test_advisory_vuln_check_cve_list_v5.py index 64b7ad4c..720b9d4c 100644 --- a/test/aio/test_advisory_vuln_check_cve_list_v5.py +++ b/test/aio/test_advisory_vuln_check_cve_list_v5.py @@ -103,7 +103,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnCheckCVEListV5: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -143,7 +143,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnCheckCVEListV5: content = vulncheck_sdk.aio.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.aio.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) @@ -151,7 +151,10 @@ def make_instance(self, include_optional) -> AdvisoryVulnCheckCVEListV5: problem_types = [ vulncheck_sdk.aio.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.aio.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.aio.models.advisory/m_reference.advisory.MReference( name = '', @@ -172,7 +175,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnCheckCVEListV5: nodes = [ vulncheck_sdk.aio.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.aio.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.aio.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', @@ -192,10 +195,6 @@ def make_instance(self, include_optional) -> AdvisoryVulnCheckCVEListV5: type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.aio.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/aio/test_advisory_vuln_check_kev.py b/test/aio/test_advisory_vuln_check_kev.py index 0b146a81..2fa548ae 100644 --- a/test/aio/test_advisory_vuln_check_kev.py +++ b/test/aio/test_advisory_vuln_check_kev.py @@ -53,7 +53,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnCheckKEV: short_description = '', vendor_project = '', vulncheck_reported_exploitation = [ - vulncheck_sdk.aio.models.advisory/reported_exploit.advisory.ReportedExploit( + vulncheck_sdk.aio.models.advisory/mitre_attack_ref.advisory.MitreAttackRef( date_added = '', url = '', ) ], diff --git a/test/aio/test_advisory_vulnerability.py b/test/aio/test_advisory_vulnerability.py deleted file mode 100644 index 93d0d330..00000000 --- a/test/aio/test_advisory_vulnerability.py +++ /dev/null @@ -1,83 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.advisory_vulnerability import AdvisoryVulnerability - -class TestAdvisoryVulnerability(unittest.TestCase): - """AdvisoryVulnerability unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryVulnerability: - """Test AdvisoryVulnerability - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryVulnerability` - """ - model = AdvisoryVulnerability() - if include_optional: - return AdvisoryVulnerability( - cve = '', - cvssscore_sets = vulncheck_sdk.aio.models.advisory/score_set.advisory.ScoreSet( - base_score = '', - vector = '', ), - description = '', - packages = [ - vulncheck_sdk.aio.models.advisory/vuln_check_package.advisory.VulnCheckPackage( - arch = '', - distro = '', - filename = '', - md5 = '', - name = '', - purl = '', - version = '', ) - ], - product_statuses = [ - vulncheck_sdk.aio.models.advisory/status.advisory.Status( - product_id = [ - '' - ], - type = '', ) - ], - references = [ - vulncheck_sdk.aio.models.advisory/cvrf_reference.advisory.CVRFReference( - description = '', - url = '', ) - ], - threats = [ - vulncheck_sdk.aio.models.advisory/threat.advisory.Threat( - severity = '', - type = '', ) - ] - ) - else: - return AdvisoryVulnerability( - ) - """ - - def testAdvisoryVulnerability(self): - """Test AdvisoryVulnerability""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_advisory_vulnrichment.py b/test/aio/test_advisory_vulnrichment.py index 7616bf15..1d3a368e 100644 --- a/test/aio/test_advisory_vulnrichment.py +++ b/test/aio/test_advisory_vulnrichment.py @@ -96,7 +96,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnrichment: nodes = [ vulncheck_sdk.aio.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.aio.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.aio.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', diff --git a/test/aio/test_advisory_vulnrichment_containers.py b/test/aio/test_advisory_vulnrichment_containers.py index 9abeba7d..0a0fac24 100644 --- a/test/aio/test_advisory_vulnrichment_containers.py +++ b/test/aio/test_advisory_vulnrichment_containers.py @@ -114,7 +114,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnrichmentContainers: nodes = [ vulncheck_sdk.aio.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.aio.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.aio.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', @@ -168,7 +168,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnrichmentContainers: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -208,7 +208,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnrichmentContainers: content = vulncheck_sdk.aio.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.aio.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) diff --git a/test/aio/test_advisory_vulnrichment_cve_ref.py b/test/aio/test_advisory_vulnrichment_cve_ref.py index c63a86a5..e7a24384 100644 --- a/test/aio/test_advisory_vulnrichment_cve_ref.py +++ b/test/aio/test_advisory_vulnrichment_cve_ref.py @@ -91,7 +91,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnrichmentCVERef: nodes = [ vulncheck_sdk.aio.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.aio.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.aio.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', diff --git a/test/aio/test_advisory_wolfi.py b/test/aio/test_advisory_wolfi.py index f5d142e7..accf4bb7 100644 --- a/test/aio/test_advisory_wolfi.py +++ b/test/aio/test_advisory_wolfi.py @@ -45,7 +45,7 @@ def make_instance(self, include_optional) -> AdvisoryWolfi: vulncheck_sdk.aio.models.advisory/wolfi_package.advisory.WolfiPackage( name = '', secfixes = [ - vulncheck_sdk.aio.models.advisory/wolfi_sec_fix.advisory.WolfiSecFix( + vulncheck_sdk.aio.models.advisory/chain_guard_sec_fix.advisory.ChainGuardSecFix( cve = [ '' ], diff --git a/test/aio/test_advisory_wolfi_package.py b/test/aio/test_advisory_wolfi_package.py index fa268ebd..5d1efd33 100644 --- a/test/aio/test_advisory_wolfi_package.py +++ b/test/aio/test_advisory_wolfi_package.py @@ -38,7 +38,7 @@ def make_instance(self, include_optional) -> AdvisoryWolfiPackage: return AdvisoryWolfiPackage( name = '', secfixes = [ - vulncheck_sdk.aio.models.advisory/wolfi_sec_fix.advisory.WolfiSecFix( + vulncheck_sdk.aio.models.advisory/chain_guard_sec_fix.advisory.ChainGuardSecFix( cve = [ '' ], diff --git a/test/aio/test_advisory_zdi.py b/test/aio/test_advisory_zdi.py index dbcc0e02..51c9d9c9 100644 --- a/test/aio/test_advisory_zdi.py +++ b/test/aio/test_advisory_zdi.py @@ -63,7 +63,7 @@ def make_instance(self, include_optional) -> AdvisoryZDI: vulncheck_sdk.aio.models.advisory/zdi_response.advisory.ZDIResponse( text = '', uri = '', - vendor = vulncheck_sdk.aio.models.advisory/zdi_response_vendor.advisory.ZDIResponseVendor( + vendor = vulncheck_sdk.aio.models.advisory/go_credits.advisory.GoCredits( name = '', ), ) ], title = '', diff --git a/test/aio/test_advisory_zdi_response.py b/test/aio/test_advisory_zdi_response.py index c80fefae..25f799af 100644 --- a/test/aio/test_advisory_zdi_response.py +++ b/test/aio/test_advisory_zdi_response.py @@ -38,7 +38,7 @@ def make_instance(self, include_optional) -> AdvisoryZDIResponse: return AdvisoryZDIResponse( text = '', uri = '', - vendor = vulncheck_sdk.aio.models.advisory/zdi_response_vendor.advisory.ZDIResponseVendor( + vendor = vulncheck_sdk.aio.models.advisory/go_credits.advisory.GoCredits( name = '', ) ) else: diff --git a/test/aio/test_api_base_metric_v3.py b/test/aio/test_api_base_metric_v3.py index 4e0f18d3..bfcc50be 100644 --- a/test/aio/test_api_base_metric_v3.py +++ b/test/aio/test_api_base_metric_v3.py @@ -36,7 +36,7 @@ def make_instance(self, include_optional) -> ApiBaseMetricV3: model = ApiBaseMetricV3() if include_optional: return ApiBaseMetricV3( - cvss_v3 = vulncheck_sdk.aio.models.api/cvssv3.api.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_api_cve.py b/test/aio/test_api_cve.py index 3ac6af2a..b16677af 100644 --- a/test/aio/test_api_cve.py +++ b/test/aio/test_api_cve.py @@ -44,7 +44,7 @@ def make_instance(self, include_optional) -> ApiCVE: data_version = '', description = vulncheck_sdk.aio.models.api/description.api.Description( description_data = [ - vulncheck_sdk.aio.models.api/description_data.api.DescriptionData( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ), @@ -52,7 +52,7 @@ def make_instance(self, include_optional) -> ApiCVE: problemtype_data = [ vulncheck_sdk.aio.models.api/problem_type_data.api.ProblemTypeData( description = [ - vulncheck_sdk.aio.models.api/problem_type_description.api.ProblemTypeDescription( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) diff --git a/test/aio/test_api_cve_extended.py b/test/aio/test_api_cve_extended.py index c64ad30e..bd2595ec 100644 --- a/test/aio/test_api_cve_extended.py +++ b/test/aio/test_api_cve_extended.py @@ -50,7 +50,7 @@ def make_instance(self, include_optional) -> ApiCVEExtended: data_version = '', description = vulncheck_sdk.aio.models.api/description.api.Description( description_data = [ - vulncheck_sdk.aio.models.api/description_data.api.DescriptionData( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ), @@ -58,7 +58,7 @@ def make_instance(self, include_optional) -> ApiCVEExtended: problemtype_data = [ vulncheck_sdk.aio.models.api/problem_type_data_extended.api.ProblemTypeDataExtended( description = [ - vulncheck_sdk.aio.models.api/problem_type_description_extended.api.ProblemTypeDescriptionExtended( + vulncheck_sdk.aio.models.advisory/cwe_data.advisory.CweData( lang = '', name = '', url = '', diff --git a/test/aio/test_api_cve_items.py b/test/aio/test_api_cve_items.py index 826ced17..d09ccb11 100644 --- a/test/aio/test_api_cve_items.py +++ b/test/aio/test_api_cve_items.py @@ -81,7 +81,7 @@ def make_instance(self, include_optional) -> ApiCveItems: data_version = '', description = vulncheck_sdk.aio.models.api/description.api.Description( description_data = [ - vulncheck_sdk.aio.models.api/description_data.api.DescriptionData( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ), @@ -120,7 +120,7 @@ def make_instance(self, include_optional) -> ApiCveItems: severity = '', user_interaction_required = True, ), base_metric_v3 = vulncheck_sdk.aio.models.api/base_metric_v3.api.BaseMetricV3( - cvss_v3 = vulncheck_sdk.aio.models.api/cvssv3.api.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -135,7 +135,43 @@ def make_instance(self, include_optional) -> ApiCveItems: version = '', ), exploitability_score = 1.337, impact_score = 1.337, ), - metric_v40 = vulncheck_sdk.aio.models.metric_v40.metricV40(), ), + metric_v40 = vulncheck_sdk.aio.models.advisory/cvssv40.advisory.CVSSV40( + automatable = '', + recovery = '', + safety = '', + attack_complexity = '', + attack_requirements = '', + attack_vector = '', + availability_requirement = '', + base_score = 1.337, + base_severity = '', + confidentiality_requirement = '', + exploit_maturity = '', + integrity_requirement = '', + modified_attack_complexity = '', + modified_attack_requirements = '', + modified_attack_vector = '', + modified_privileges_required = '', + modified_sub_availability_impact = '', + modified_sub_confidentiality_impact = '', + modified_sub_integrity_impact = '', + modified_user_interaction = '', + modified_vuln_availability_impact = '', + modified_vuln_confidentiality_impact = '', + modified_vuln_integrity_impact = '', + privileges_required = '', + provider_urgency = '', + sub_availability_impact = '', + sub_confidentiality_impact = '', + sub_integrity_impact = '', + user_interaction = '', + value_density = '', + vector_string = '', + version = '', + vuln_availability_impact = '', + vuln_confidentiality_impact = '', + vuln_integrity_impact = '', + vulnerability_response_effort = '', ), ), last_modified_date = '', published_date = '', vc_configurations = vulncheck_sdk.aio.models.api/configurations.api.Configurations( diff --git a/test/aio/test_api_cve_items_extended.py b/test/aio/test_api_cve_items_extended.py index 52125883..b0b63201 100644 --- a/test/aio/test_api_cve_items_extended.py +++ b/test/aio/test_api_cve_items_extended.py @@ -88,7 +88,7 @@ def make_instance(self, include_optional) -> ApiCveItemsExtended: data_version = '', description = vulncheck_sdk.aio.models.api/description.api.Description( description_data = [ - vulncheck_sdk.aio.models.api/description_data.api.DescriptionData( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ), @@ -131,7 +131,7 @@ def make_instance(self, include_optional) -> ApiCveItemsExtended: severity = '', user_interaction_required = True, ), base_metric_v3 = vulncheck_sdk.aio.models.api/base_metric_v3.api.BaseMetricV3( - cvss_v3 = vulncheck_sdk.aio.models.api/cvssv3.api.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -240,7 +240,7 @@ def make_instance(self, include_optional) -> ApiCveItemsExtended: ], published_date = '', related_attack_patterns = [ - vulncheck_sdk.aio.models.api/related_attack_pattern.api.RelatedAttackPattern( + vulncheck_sdk.aio.models.advisory/capec.advisory.Capec( capec_id = '', capec_name = '', capec_url = '', diff --git a/test/aio/test_api_date_time.py b/test/aio/test_api_date_time.py deleted file mode 100644 index bb101f73..00000000 --- a/test/aio/test_api_date_time.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.aio.models.api_date_time import ApiDateTime - -class TestApiDateTime(unittest.TestCase): - """ApiDateTime unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> ApiDateTime: - """Test ApiDateTime - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `ApiDateTime` - """ - model = ApiDateTime() - if include_optional: - return ApiDateTime( - var_date = '' - ) - else: - return ApiDateTime( - ) - """ - - def testApiDateTime(self): - """Test ApiDateTime""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/aio/test_api_description.py b/test/aio/test_api_description.py index 8a8a1bfb..7a2f437d 100644 --- a/test/aio/test_api_description.py +++ b/test/aio/test_api_description.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> ApiDescription: if include_optional: return ApiDescription( description_data = [ - vulncheck_sdk.aio.models.api/description_data.api.DescriptionData( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ] diff --git a/test/aio/test_api_exploits_changelog.py b/test/aio/test_api_exploits_changelog.py index f33b162c..69cfa0f4 100644 --- a/test/aio/test_api_exploits_changelog.py +++ b/test/aio/test_api_exploits_changelog.py @@ -41,8 +41,8 @@ def make_instance(self, include_optional) -> ApiExploitsChangelog: change_time = '', change_type = '', field = '', - new_value = vulncheck_sdk.aio.models.new_value.new_value(), - old_value = vulncheck_sdk.aio.models.old_value.old_value(), ) + new_value = null, + old_value = null, ) ], cve = '' ) diff --git a/test/aio/test_api_impact.py b/test/aio/test_api_impact.py index 2dbc18a4..d051f520 100644 --- a/test/aio/test_api_impact.py +++ b/test/aio/test_api_impact.py @@ -56,7 +56,7 @@ def make_instance(self, include_optional) -> ApiImpact: severity = '', user_interaction_required = True, ), base_metric_v3 = vulncheck_sdk.aio.models.api/base_metric_v3.api.BaseMetricV3( - cvss_v3 = vulncheck_sdk.aio.models.api/cvssv3.api.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_api_impact_extended.py b/test/aio/test_api_impact_extended.py index 69f9ee03..22f8fc81 100644 --- a/test/aio/test_api_impact_extended.py +++ b/test/aio/test_api_impact_extended.py @@ -56,7 +56,7 @@ def make_instance(self, include_optional) -> ApiImpactExtended: severity = '', user_interaction_required = True, ), base_metric_v3 = vulncheck_sdk.aio.models.api/base_metric_v3.api.BaseMetricV3( - cvss_v3 = vulncheck_sdk.aio.models.api/cvssv3.api.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> ApiImpactExtended: exploitability_score = 1.337, impact_score = 1.337, ), corrected_base_metric_v3 = vulncheck_sdk.aio.models.api/base_metric_v3.api.BaseMetricV3( - cvss_v3 = vulncheck_sdk.aio.models.api/cvssv3.api.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_api_nvd20_cve.py b/test/aio/test_api_nvd20_cve.py index 72557470..2cdcd13e 100644 --- a/test/aio/test_api_nvd20_cve.py +++ b/test/aio/test_api_nvd20_cve.py @@ -61,7 +61,7 @@ def make_instance(self, include_optional) -> ApiNVD20CVE: operator = '', ) ], descriptions = [ - vulncheck_sdk.aio.models.api/nvd20_description.api.NVD20Description( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], @@ -166,7 +166,7 @@ def make_instance(self, include_optional) -> ApiNVD20CVE: weaknesses = [ vulncheck_sdk.aio.models.api/nvd20_weakness.api.NVD20Weakness( description = [ - vulncheck_sdk.aio.models.api/nvd20_description.api.NVD20Description( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], diff --git a/test/aio/test_api_nvd20_cve_extended.py b/test/aio/test_api_nvd20_cve_extended.py index de7c7ce1..ea3d07ca 100644 --- a/test/aio/test_api_nvd20_cve_extended.py +++ b/test/aio/test_api_nvd20_cve_extended.py @@ -69,7 +69,7 @@ def make_instance(self, include_optional) -> ApiNVD20CVEExtended: ], date_added = '', descriptions = [ - vulncheck_sdk.aio.models.api/nvd20_description.api.NVD20Description( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], @@ -188,10 +188,7 @@ def make_instance(self, include_optional) -> ApiNVD20CVEExtended: ], threat_cvssv40 = vulncheck_sdk.aio.models.api/nvd20_threat_cvssv40.api.NVD20ThreatCVSSV40( - associated_base_metric_v40 = vulncheck_sdk.aio.models.api/nvd20_threat_associated_base_metric.api.NVD20ThreatAssociatedBaseMetric( - base_score = 1.337, - source = '', - type = '', ), + associated_base_metric_v40 = , base_threat_score = 1.337, base_threat_severity = '', exploit_maturity = '', ), @@ -251,7 +248,7 @@ def make_instance(self, include_optional) -> ApiNVD20CVEExtended: url = '', ) ], related_attack_patterns = [ - vulncheck_sdk.aio.models.api/related_attack_pattern.api.RelatedAttackPattern( + vulncheck_sdk.aio.models.advisory/capec.advisory.Capec( capec_id = '', capec_name = '', capec_url = '', @@ -295,7 +292,7 @@ def make_instance(self, include_optional) -> ApiNVD20CVEExtended: weaknesses = [ vulncheck_sdk.aio.models.api/nvd20_weakness_extended.api.NVD20WeaknessExtended( description = [ - vulncheck_sdk.aio.models.api/nvd20_weakness_desc_extended.api.NVD20WeaknessDescExtended( + vulncheck_sdk.aio.models.advisory/cwe_data.advisory.CweData( lang = '', name = '', url = '', diff --git a/test/aio/test_api_nvd20_metric_extended.py b/test/aio/test_api_nvd20_metric_extended.py index 4dc275a5..50fcbf14 100644 --- a/test/aio/test_api_nvd20_metric_extended.py +++ b/test/aio/test_api_nvd20_metric_extended.py @@ -271,7 +271,7 @@ def make_instance(self, include_optional) -> ApiNVD20MetricExtended: version = '', ) ], threat_cvssv40 = vulncheck_sdk.aio.models.api/nvd20_threat_cvssv40.api.NVD20ThreatCVSSV40( - associated_base_metric_v40 = vulncheck_sdk.aio.models.api/nvd20_threat_associated_base_metric.api.NVD20ThreatAssociatedBaseMetric( + associated_base_metric_v40 = vulncheck_sdk.aio.models.api/nvd20_temporal_associated_base_metric.api.NVD20TemporalAssociatedBaseMetric( base_score = 1.337, source = '', type = '', ), @@ -280,7 +280,7 @@ def make_instance(self, include_optional) -> ApiNVD20MetricExtended: exploit_maturity = '', ), threat_cvssv40_secondary = [ vulncheck_sdk.aio.models.api/nvd20_threat_cvssv40.api.NVD20ThreatCVSSV40( - associated_base_metric_v40 = vulncheck_sdk.aio.models.api/nvd20_threat_associated_base_metric.api.NVD20ThreatAssociatedBaseMetric( + associated_base_metric_v40 = vulncheck_sdk.aio.models.api/nvd20_temporal_associated_base_metric.api.NVD20TemporalAssociatedBaseMetric( base_score = 1.337, source = '', type = '', ), diff --git a/test/aio/test_api_nvd20_threat_cvssv40.py b/test/aio/test_api_nvd20_threat_cvssv40.py index b30b15cb..a320bd8d 100644 --- a/test/aio/test_api_nvd20_threat_cvssv40.py +++ b/test/aio/test_api_nvd20_threat_cvssv40.py @@ -36,7 +36,7 @@ def make_instance(self, include_optional) -> ApiNVD20ThreatCVSSV40: model = ApiNVD20ThreatCVSSV40() if include_optional: return ApiNVD20ThreatCVSSV40( - associated_base_metric_v40 = vulncheck_sdk.aio.models.api/nvd20_threat_associated_base_metric.api.NVD20ThreatAssociatedBaseMetric( + associated_base_metric_v40 = vulncheck_sdk.aio.models.api/nvd20_temporal_associated_base_metric.api.NVD20TemporalAssociatedBaseMetric( base_score = 1.337, source = '', type = '', ), diff --git a/test/aio/test_api_nvd20_weakness.py b/test/aio/test_api_nvd20_weakness.py index 3d45c47d..d1931177 100644 --- a/test/aio/test_api_nvd20_weakness.py +++ b/test/aio/test_api_nvd20_weakness.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> ApiNVD20Weakness: if include_optional: return ApiNVD20Weakness( description = [ - vulncheck_sdk.aio.models.api/nvd20_description.api.NVD20Description( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], diff --git a/test/aio/test_api_nvd20_weakness_extended.py b/test/aio/test_api_nvd20_weakness_extended.py index 71623dfc..800dfc49 100644 --- a/test/aio/test_api_nvd20_weakness_extended.py +++ b/test/aio/test_api_nvd20_weakness_extended.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> ApiNVD20WeaknessExtended: if include_optional: return ApiNVD20WeaknessExtended( description = [ - vulncheck_sdk.aio.models.api/nvd20_weakness_desc_extended.api.NVD20WeaknessDescExtended( + vulncheck_sdk.aio.models.advisory/cwe_data.advisory.CweData( lang = '', name = '', url = '', diff --git a/test/aio/test_api_problem_type.py b/test/aio/test_api_problem_type.py index 3fc7e134..597b76ee 100644 --- a/test/aio/test_api_problem_type.py +++ b/test/aio/test_api_problem_type.py @@ -39,7 +39,7 @@ def make_instance(self, include_optional) -> ApiProblemType: problemtype_data = [ vulncheck_sdk.aio.models.api/problem_type_data.api.ProblemTypeData( description = [ - vulncheck_sdk.aio.models.api/problem_type_description.api.ProblemTypeDescription( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) diff --git a/test/aio/test_api_problem_type_data.py b/test/aio/test_api_problem_type_data.py index a42e61a5..207bbec7 100644 --- a/test/aio/test_api_problem_type_data.py +++ b/test/aio/test_api_problem_type_data.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> ApiProblemTypeData: if include_optional: return ApiProblemTypeData( description = [ - vulncheck_sdk.aio.models.api/problem_type_description.api.ProblemTypeDescription( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ] diff --git a/test/aio/test_api_problem_type_data_extended.py b/test/aio/test_api_problem_type_data_extended.py index ceeee024..6e6442d7 100644 --- a/test/aio/test_api_problem_type_data_extended.py +++ b/test/aio/test_api_problem_type_data_extended.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> ApiProblemTypeDataExtended: if include_optional: return ApiProblemTypeDataExtended( description = [ - vulncheck_sdk.aio.models.api/problem_type_description_extended.api.ProblemTypeDescriptionExtended( + vulncheck_sdk.aio.models.advisory/cwe_data.advisory.CweData( lang = '', name = '', url = '', diff --git a/test/aio/test_api_problem_type_extended.py b/test/aio/test_api_problem_type_extended.py index 4cc8bcc4..f36f833d 100644 --- a/test/aio/test_api_problem_type_extended.py +++ b/test/aio/test_api_problem_type_extended.py @@ -39,7 +39,7 @@ def make_instance(self, include_optional) -> ApiProblemTypeExtended: problemtype_data = [ vulncheck_sdk.aio.models.api/problem_type_data_extended.api.ProblemTypeDataExtended( description = [ - vulncheck_sdk.aio.models.api/problem_type_description_extended.api.ProblemTypeDescriptionExtended( + vulncheck_sdk.aio.models.advisory/cwe_data.advisory.CweData( lang = '', name = '', url = '', diff --git a/test/aio/test_api_update.py b/test/aio/test_api_update.py index 9fd2ff2b..e26e4e55 100644 --- a/test/aio/test_api_update.py +++ b/test/aio/test_api_update.py @@ -42,12 +42,11 @@ def make_instance(self, include_optional) -> ApiUpdate: date_added = '', description = '', id = '', - issued = vulncheck_sdk.aio.models.api/date_time.api.DateTime( - date = '', ), + issued = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), os_arch = '', os_version = '', packages = [ - vulncheck_sdk.aio.models.api/package.api.Package( + vulncheck_sdk.aio.models.advisory/package.advisory.Package( filename = '', name = '', release = '', @@ -55,7 +54,7 @@ def make_instance(self, include_optional) -> ApiUpdate: version = '', ) ], references = [ - vulncheck_sdk.aio.models.api/reference.api.Reference( + vulncheck_sdk.aio.models.advisory/reference.advisory.Reference( href = '', id = '', title = '', @@ -64,8 +63,7 @@ def make_instance(self, include_optional) -> ApiUpdate: severity = '', title = '', type = '', - updated = vulncheck_sdk.aio.models.api/date_time.api.DateTime( - date = '', ) + updated = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution() ) else: return ApiUpdate( diff --git a/test/aio/test_purls_purl_response.py b/test/aio/test_purls_purl_response.py index 3fe22d5f..3e691988 100644 --- a/test/aio/test_purls_purl_response.py +++ b/test/aio/test_purls_purl_response.py @@ -36,7 +36,7 @@ def make_instance(self, include_optional) -> PurlsPurlResponse: model = PurlsPurlResponse() if include_optional: return PurlsPurlResponse( - artifacts = None, + artifacts = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), cves = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_abbott_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_abbott_paginate_pagination.py index 08f1b36e..e8003432 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_abbott_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_abbott_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/abbott.advisory.Abbott( + vulncheck_sdk.aio.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_absolute_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_absolute_paginate_pagination.py index 22536a2c..2722c2de 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_absolute_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_absolute_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/absolute.advisory.Absolute( + vulncheck_sdk.aio.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py index 792a8d6e..7c67caa6 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py @@ -92,7 +92,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi date_added = '', link = '', solutions = [ - vulncheck_sdk.aio.models.advisory/adobe_solution.advisory.AdobeSolution( + vulncheck_sdk.aio.models.advisory/adobe_affected.advisory.AdobeAffected( platform = '', product = '', version = '', ) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py index 0399a256..47f18f69 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/apache_arrow.advisory.ApacheArrow( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py index bebc6e77..f2cf4ce1 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/apache_couch_db.advisory.ApacheCouchDB( + vulncheck_sdk.aio.models.advisory/apache_archiva.advisory.ApacheArchiva( affected = '', cve = [ '' diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py index 1635a933..7f1e811b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/apache_guacamole.advisory.ApacheGuacamole( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py index 0153f36d..57a82b55 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/apache_jsp_wiki.advisory.ApacheJSPWiki( + vulncheck_sdk.aio.models.advisory/apache_archiva.advisory.ApacheArchiva( affected = '', cve = [ '' diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py index 826cdf04..4b46a2ef 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/apache_kafka.advisory.ApacheKafka( + vulncheck_sdk.aio.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py index dfc36456..43350b28 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/apache_of_biz.advisory.ApacheOFBiz( + vulncheck_sdk.aio.models.advisory/apache_flink.advisory.ApacheFlink( affected = '', cve = [ '' diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py index 279216b6..0ce4aa1e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/apache_open_meetings.advisory.ApacheOpenMeetings( + vulncheck_sdk.aio.models.advisory/apache_archiva.advisory.ApacheArchiva( affected = '', cve = [ '' diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py index 1ddd662f..23e79986 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/apache_open_office.advisory.ApacheOpenOffice( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py index be10c2df..f6d45176 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/apache_spark.advisory.ApacheSpark( + vulncheck_sdk.aio.models.advisory/apache_archiva.advisory.ApacheArchiva( affected = '', cve = [ '' diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py index 25ff0e4e..c80093ed 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/apache_tomcat.advisory.ApacheTomcat( + vulncheck_sdk.aio.models.advisory/apache_http.advisory.ApacheHTTP( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py index e6460587..15a403f7 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/apache_zoo_keeper.advisory.ApacheZooKeeper( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_app_check_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_app_check_paginate_pagination.py index 6945ac59..3a813c54 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_app_check_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_app_check_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/app_check.advisory.AppCheck( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py index 6ad8ccdf..33c69307 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/asset_note.advisory.AssetNote( + vulncheck_sdk.aio.models.advisory/apache_commons.advisory.ApacheCommons( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py index 96c0f446..aac6ab47 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/audiocodes.advisory.Audiocodes( + vulncheck_sdk.aio.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py index e1a69656..e9b52795 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/avigilon.advisory.Avigilon( + vulncheck_sdk.aio.models.advisory/autodesk.advisory.Autodesk( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_axis_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_axis_paginate_pagination.py index 3bf83488..2d05d445 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_axis_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_axis_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/axis.advisory.Axis( + vulncheck_sdk.aio.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py index 627cbf9e..9716e1d8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py @@ -81,7 +81,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vector = vulncheck_sdk.aio.models.advisory/bdu_vector.advisory.BDUVector( score = '', text = '', ), ), - cvss3 = vulncheck_sdk.aio.models.advisory/bdu_cvss3.advisory.BDUCvss3(), + cvss3 = vulncheck_sdk.aio.models.advisory/bdu_cvss.advisory.BDUCvss(), cwe = '', date_added = '', description_ru = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py index e42953b7..8f3862c5 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/beckman_coulter.advisory.BeckmanCoulter( + vulncheck_sdk.aio.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py index 73c8eb64..4310c39f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/beyond_trust.advisory.BeyondTrust( + vulncheck_sdk.aio.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py index b0a7d607..f4dc90be 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/cert_in.advisory.CertIN( + vulncheck_sdk.aio.models.advisory/binarly.advisory.Binarly( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py index 10540205..3ac27c67 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.aio.models.advisory/cisa_csaf_adv.advisory.CisaCsafAdv( csaf_json = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( @@ -149,7 +211,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py index 3dbc6190..158166b9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py @@ -73,7 +73,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi ], ), data = [ vulncheck_sdk.aio.models.advisory/cisco_csaf.advisory.CiscoCSAF( - csaf = vulncheck_sdk.aio.models.csaf.csaf(), + csaf = null, cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py index b5c638b3..114331b2 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/cloud_bees.advisory.CloudBees( + vulncheck_sdk.aio.models.advisory/autodesk.advisory.Autodesk( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py index 1d74f978..d3d90181 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py @@ -75,66 +75,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vulncheck_sdk.aio.models.advisory/cvrf.advisory.Cvrf( cve = [ '' - ], - notes = [ - vulncheck_sdk.aio.models.advisory/document_note.advisory.DocumentNote( - text = '', - title = '', - type = '', ) - ], - product_tree = vulncheck_sdk.aio.models.advisory/product_tree.advisory.ProductTree( - relationships = [ - vulncheck_sdk.aio.models.advisory/relationship.advisory.Relationship( - product_reference = '', - relates_to_product_reference = '', - relation_type = '', ) - ], ), - references = [ - vulncheck_sdk.aio.models.advisory/cvrf_reference.advisory.CVRFReference( - description = '', - url = '', ) - ], - title = '', - tracking = vulncheck_sdk.aio.models.advisory/document_tracking.advisory.DocumentTracking( - current_release_date = '', - id = '', - initial_release_date = '', - revision_history = [ - vulncheck_sdk.aio.models.advisory/revision.advisory.Revision( - date = '', - description = '', - number = '', ) - ], - status = '', - version = '', ), - vulnerabilities = [ - vulncheck_sdk.aio.models.advisory/vulnerability.advisory.Vulnerability( - cvssscore_sets = vulncheck_sdk.aio.models.advisory/score_set.advisory.ScoreSet( - base_score = '', - vector = '', ), - description = '', - packages = [ - vulncheck_sdk.aio.models.advisory/vuln_check_package.advisory.VulnCheckPackage( - arch = '', - distro = '', - filename = '', - md5 = '', - name = '', - purl = '', - version = '', ) - ], - product_statuses = [ - vulncheck_sdk.aio.models.advisory/status.advisory.Status( - product_id = [ - '' - ], - type = '', ) - ], - threats = [ - vulncheck_sdk.aio.models.advisory/threat.advisory.Threat( - severity = '', - type = '', ) - ], ) ], ) ] ) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_d_link_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_d_link_paginate_pagination.py index d3e3ce9c..dc5ed6f2 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_d_link_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_d_link_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/d_link.advisory.DLink( + vulncheck_sdk.aio.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_dahua_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_dahua_paginate_pagination.py index 24520a7d..87a8c102 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_dahua_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_dahua_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/dahua.advisory.Dahua( + vulncheck_sdk.aio.models.advisory/autodesk.advisory.Autodesk( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py index 85f1bc9d..69824bfb 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py @@ -74,7 +74,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.aio.models.advisory/debian_security_advisory.advisory.DebianSecurityAdvisory( affected_packages = [ - vulncheck_sdk.aio.models.advisory/affected_debian_package.advisory.AffectedDebianPackage( + vulncheck_sdk.aio.models.advisory/vulnerable_product.advisory.VulnerableProduct( name = '', version = '', ) ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_dell_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_dell_paginate_pagination.py index 11800d99..623d3890 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_dell_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_dell_paginate_pagination.py @@ -80,7 +80,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi ], date_added = '', dell_cves = [ - vulncheck_sdk.aio.models.advisory/dell_cve.advisory.DellCVE( + vulncheck_sdk.aio.models.advisory/adobe_cve.advisory.AdobeCVE( cvss_score = '', cvss_vector = '', ) ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_dnn_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_dnn_paginate_pagination.py index bcf0f2d5..2304afaf 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_dnn_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_dnn_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/dnn.advisory.DNN( + vulncheck_sdk.aio.models.advisory/apache_hadoop.advisory.ApacheHadoop( affected = '', cve = [ '' diff --git a/test/aio/test_render_response_with_metadata_array_advisory_draytek_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_draytek_paginate_pagination.py index 19ca1665..98333054 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_draytek_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_draytek_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/draytek.advisory.Draytek( + vulncheck_sdk.aio.models.advisory/django.advisory.Django( affected = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py index 32018256..10bac288 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py @@ -80,16 +80,16 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vulncheck_sdk.aio.models.advisory/cycle.advisory.Cycle( codename = '', cycle = '', - discontinued = vulncheck_sdk.aio.models.discontinued.discontinued(), - eol = vulncheck_sdk.aio.models.eol.eol(), - extended_support = vulncheck_sdk.aio.models.extended_support.extendedSupport(), + discontinued = null, + eol = null, + extended_support = null, latest = '', latest_release_date = '', link = '', - lts = vulncheck_sdk.aio.models.lts.lts(), + lts = null, release_date = '', release_label = '', - support = vulncheck_sdk.aio.models.support.support(), ) + support = null, ) ], date_added = '', name = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_f5_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_f5_paginate_pagination.py index 9705e356..cbe99105 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_f5_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_f5_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/f5.advisory.F5( + vulncheck_sdk.aio.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py index 49319acc..dceafb62 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/f_secure.advisory.FSecure( + vulncheck_sdk.aio.models.advisory/apache_archiva.advisory.ApacheArchiva( affected = '', cve = [ '' diff --git a/test/aio/test_render_response_with_metadata_array_advisory_fastly_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_fastly_paginate_pagination.py index bf03eb09..c6e50f85 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_fastly_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_fastly_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/fastly.advisory.Fastly( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py index 05f12453..92e804e4 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/file_zilla.advisory.FileZilla( + vulncheck_sdk.aio.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py index a59ca511..8be914ea 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/flatt_security.advisory.FlattSecurity( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_gcp_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_gcp_paginate_pagination.py index f9c2ebfb..c33464ed 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_gcp_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_gcp_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/gcp.advisory.GCP( + vulncheck_sdk.aio.models.advisory/asterisk.advisory.Asterisk( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py index fd264e7d..ca60cfe6 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/ge_gas.advisory.GEGas( + vulncheck_sdk.aio.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_genetec_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_genetec_paginate_pagination.py index 1fe00c7c..d4103b88 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_genetec_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_genetec_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/genetec.advisory.Genetec( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py index 730167fb..3fd1b314 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py @@ -82,13 +82,8 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vector_string = '', ), cwes = vulncheck_sdk.aio.models.advisory/cwes.advisory.Cwes( nodes = [ - vulncheck_sdk.aio.models.advisory/cwe_node.advisory.CWENode( - cweid = '', - description = '', - id = '', - name = '', ) - ], - total_count = 56, ), + vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution() + ], ), database_id = 56, date_added = '', description = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py index 1c7782f2..bb62511d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py @@ -84,13 +84,13 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi affected_functions = [ '' ], ), - package = vulncheck_sdk.aio.models.advisory/ghsa_package.advisory.GHSAPackage( + package = vulncheck_sdk.aio.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), ranges = [ vulncheck_sdk.aio.models.advisory/ghsa_range.advisory.GHSARange( events = [ - vulncheck_sdk.aio.models.advisory/ghsa_event.advisory.GHSAEvent( + vulncheck_sdk.aio.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], @@ -113,13 +113,13 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi modified = '', published = '', references = [ - vulncheck_sdk.aio.models.advisory/ghsa_reference.advisory.GHSAReference( + vulncheck_sdk.aio.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], schema_version = '', severity = [ - vulncheck_sdk.aio.models.advisory/ghsa_severity.advisory.GHSASeverity( + vulncheck_sdk.aio.models.advisory/severity.advisory.Severity( score = '', type = '', ) ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py index d13ae699..f8a52d55 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/gigabyte.advisory.Gigabyte( + vulncheck_sdk.aio.models.advisory/dragos_advisory.advisory.DragosAdvisory( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py index 827543af..d59dcc1d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/gitee_exploit.advisory.GiteeExploit( + vulncheck_sdk.aio.models.advisory/git_lab_exploit.advisory.GitLabExploit( clone_https_url = '', clone_ssh_url = '', clone_ssh_url_cached = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py index cb34f25c..463b9278 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py @@ -76,7 +76,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi advisory_url = '', affected = [ vulncheck_sdk.aio.models.advisory/go_vuln_affected.advisory.GoVulnAffected( - database_specific = vulncheck_sdk.aio.models.advisory/go_vuln_database_specific.advisory.GoVulnDatabaseSpecific( + database_specific = vulncheck_sdk.aio.models.advisory/gh_reference.advisory.GHReference( url = '', ), ecosystem_specific = vulncheck_sdk.aio.models.advisory/go_vuln_ecosystem_specific.advisory.GoVulnEcosystemSpecific( imports = [ @@ -86,13 +86,13 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ) ], ), - package = vulncheck_sdk.aio.models.advisory/go_vuln_package.advisory.GoVulnPackage( + package = vulncheck_sdk.aio.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), ranges = [ vulncheck_sdk.aio.models.advisory/go_vuln_ranges.advisory.GoVulnRanges( events = [ - vulncheck_sdk.aio.models.advisory/go_event.advisory.GoEvent( + vulncheck_sdk.aio.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], @@ -118,7 +118,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi modified = '', published = '', references = [ - vulncheck_sdk.aio.models.advisory/go_vuln_reference.advisory.GoVulnReference( + vulncheck_sdk.aio.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], ) diff --git a/test/aio/test_render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py index 776f4900..69de2746 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/harmony_os.advisory.HarmonyOS( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py index a30419e6..90bbb5f0 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py @@ -78,7 +78,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vulncheck_sdk.aio.models.advisory/haskell_affected.advisory.HaskellAffected( affected_constraint = '', affected_versions = [ - vulncheck_sdk.aio.models.advisory/haskell_version.advisory.HaskellVersion( + vulncheck_sdk.aio.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py index 05192637..ec2216b9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/honeywell.advisory.Honeywell( + vulncheck_sdk.aio.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ibm_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ibm_paginate_pagination.py index 4aca8f32..321e9fe2 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ibm_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ibm_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/ibm.advisory.IBM( + vulncheck_sdk.aio.models.advisory/apache_http.advisory.ApacheHTTP( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py index 4a301c0e..038fdf17 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/ivanti.advisory.Ivanti( + vulncheck_sdk.aio.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py index dbdcb8fc..1d7c058d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/ivanti_rss.advisory.IvantiRSS( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py index f00fe109..1aebca92 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/jnj_advisory.advisory.JNJAdvisory( + vulncheck_sdk.aio.models.advisory/apache_http.advisory.ApacheHTTP( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py index 6e9d6614..0b0649ec 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/kunbus.advisory.Kunbus( + vulncheck_sdk.aio.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_lg_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_lg_paginate_pagination.py index 2849390f..5fff3f9d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_lg_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_lg_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/lg.advisory.LG( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_linux_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_linux_paginate_pagination.py index 17b001ac..30c1adc5 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_linux_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_linux_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/linux.advisory.Linux( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py index 26fe5760..331f5539 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py @@ -80,7 +80,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi description = '', id = '', lol_json = { - 'key' : None + 'key' : null }, mitre_id = '', references = [ diff --git a/test/aio/test_render_response_with_metadata_array_advisory_m_files_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_m_files_paginate_pagination.py index 2e7bbf10..0afebc52 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_m_files_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_m_files_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/m_files.advisory.MFiles( + vulncheck_sdk.aio.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py index d164fc1f..7319fa1c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py @@ -81,8 +81,8 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi malware = vulncheck_sdk.aio.models.advisory/osv_obj.advisory.OSVObj( affected = [ vulncheck_sdk.aio.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.aio.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.aio.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.aio.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', @@ -116,7 +116,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi modified = '', published = '', references = [ - vulncheck_sdk.aio.models.advisory/osv_reference.advisory.OSVReference( + vulncheck_sdk.aio.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py index bd06945b..3637d0fc 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py @@ -97,9 +97,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi display_value = '', ) ], product_specific_details = [ - vulncheck_sdk.aio.models.advisory/product_specific_detail.advisory.ProductSpecificDetail( - id = '', - display_value = '', ) + ], summary = '', version = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py index 8ce0b4ff..943334bc 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py @@ -78,15 +78,13 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi href = '', id = '', title = '', ), - cve = vulncheck_sdk.aio.models.advisory/oval_cve.advisory.OvalCVE( + cve = vulncheck_sdk.aio.models.advisory/bugzilla.advisory.Bugzilla( href = '', id = '', title = '', ), - issued = vulncheck_sdk.aio.models.advisory/issued.advisory.Issued( - date = '', ), + issued = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), severity = '', - updated = vulncheck_sdk.aio.models.advisory/updated.advisory.Updated( - date = '', ), ), + updated = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), ), cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py index d86b899f..72887415 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.aio.models.advisory/microsoft_csaf.advisory.MicrosoftCSAF( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( @@ -149,7 +211,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py index 76ee2ed6..100b58b0 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py @@ -77,7 +77,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], cvrf = vulncheck_sdk.aio.models.advisory/mscvrf.advisory.MSCVRF( - document_title = vulncheck_sdk.aio.models.advisory/ms_document_title.advisory.MSDocumentTitle( + document_title = vulncheck_sdk.aio.models.advisory/i_val.advisory.IVal( value = '', ), document_tracking = vulncheck_sdk.aio.models.advisory/m_document_tracking.advisory.MDocumentTracking( current_release_date = '', @@ -85,8 +85,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi identification = vulncheck_sdk.aio.models.advisory/m_identification.advisory.MIdentification( alias = vulncheck_sdk.aio.models.advisory/i_val.advisory.IVal( value = '', ), - id = vulncheck_sdk.aio.models.advisory/i_val.advisory.IVal( - value = '', ), ), + id = , ), revisionhistory = [ vulncheck_sdk.aio.models.advisory/r_revision.advisory.RRevision( date = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py index 366595e1..494af572 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py @@ -75,7 +75,13 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vulncheck_sdk.aio.models.advisory/microsoft_driver_block_list.advisory.MicrosoftDriverBlockList( date_added = '', file_id = '', - file_metadata = vulncheck_sdk.aio.models.file_metadata.file_metadata(), ) + file_metadata = vulncheck_sdk.aio.models.advisory/microsoft_file_metadata.advisory.MicrosoftFileMetadata( + file_name = '', + maximum_file_version = '', + minimum_file_version = '', + product_name = '', + sha1_hash = '', + sha256_hash = '', ), ) ] ) else: diff --git a/test/aio/test_render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py index ca130e61..8cda1931 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/mikrotik.advisory.Mikrotik( + vulncheck_sdk.aio.models.advisory/grafana.advisory.Grafana( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_mindray_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_mindray_paginate_pagination.py index cafd6bb8..a05edc43 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_mindray_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_mindray_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/mindray.advisory.Mindray( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_mitel_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_mitel_paginate_pagination.py index a7610355..9169308e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_mitel_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_mitel_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/mitel.advisory.Mitel( + vulncheck_sdk.aio.models.advisory/asterisk.advisory.Asterisk( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py index f918e9f2..2f9c880b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py @@ -140,7 +140,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -180,7 +180,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi content = vulncheck_sdk.aio.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.aio.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) @@ -188,7 +188,10 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi problem_types = [ vulncheck_sdk.aio.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.aio.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.aio.models.advisory/m_reference.advisory.MReference( name = '', @@ -209,7 +212,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi nodes = [ vulncheck_sdk.aio.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.aio.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.aio.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', @@ -229,10 +232,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.aio.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py index 80b56451..e32139cf 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/moxa_advisory.advisory.MoxaAdvisory( + vulncheck_sdk.aio.models.advisory/advantech.advisory.Advantech( advisory_id = '', cve = [ '' diff --git a/test/aio/test_render_response_with_metadata_array_advisory_naver_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_naver_paginate_pagination.py index 535d4d52..8e593dc0 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_naver_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_naver_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/naver.advisory.Naver( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py index fbe96288..e59b3eaf 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.aio.models.advisory/ncsc.advisory.NCSC( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( @@ -149,7 +211,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py index 449e3a20..77f7f682 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.aio.models.advisory/ncsccve.advisory.NCSCCVE( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( @@ -149,7 +211,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_netgate_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_netgate_paginate_pagination.py index 196ce5d0..a035a9e7 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_netgate_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_netgate_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/netgate.advisory.Netgate( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_nokia_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_nokia_paginate_pagination.py index a4c9a349..0ed7d25a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_nokia_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_nokia_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/nokia.advisory.Nokia( + vulncheck_sdk.aio.models.advisory/forge_rock.advisory.ForgeRock( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py index f6febff0..3ee452da 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/note_pad_plus_plus.advisory.NotePadPlusPlus( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py index 83e59686..0167ac4c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/nozomi.advisory.Nozomi( + vulncheck_sdk.aio.models.advisory/glibc.advisory.Glibc( affected = '', cve = [ '' diff --git a/test/aio/test_render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py index 26310abf..a9d6a56f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py @@ -83,7 +83,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi source_identifiers = [ '' ], - v3_acceptance_level = vulncheck_sdk.aio.models.advisory/v3_acceptance_level.advisory.V3AcceptanceLevel( + v3_acceptance_level = vulncheck_sdk.aio.models.advisory/cwe_acceptance_level.advisory.CweAcceptanceLevel( description = '', last_modified = '', ), ) ] diff --git a/test/aio/test_render_response_with_metadata_array_advisory_omron_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_omron_paginate_pagination.py index 01daa00a..3b22c0a9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_omron_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_omron_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/omron.advisory.Omron( + vulncheck_sdk.aio.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_one_e_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_one_e_paginate_pagination.py index 02589d3e..ed407915 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_one_e_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_one_e_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/one_e.advisory.OneE( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py index c9476e7a..c02e11aa 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py @@ -78,7 +78,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi ], date_added = '', openjdk_cves = [ - vulncheck_sdk.aio.models.advisory/open_jdkcve.advisory.OpenJDKCVE( + vulncheck_sdk.aio.models.advisory/adobe_cve.advisory.AdobeCVE( cvss_score = '', cvss_vector = '', ) ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py index bdfb5e66..9de627e4 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/open_ssh.advisory.OpenSSH( + vulncheck_sdk.aio.models.advisory/apache_pulsar.advisory.ApachePulsar( affected = '', cve = [ '' diff --git a/test/aio/test_render_response_with_metadata_array_advisory_opengear_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_opengear_paginate_pagination.py index 49281485..ab97f4ad 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_opengear_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_opengear_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/opengear.advisory.Opengear( + vulncheck_sdk.aio.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py index 41ad3310..cf578721 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.aio.models.advisory/oracle_cpucsaf.advisory.OracleCPUCSAF( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( @@ -149,7 +211,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_osv_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_osv_paginate_pagination.py index e0a0b2e1..890e2eea 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_osv_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_osv_paginate_pagination.py @@ -81,8 +81,8 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi osv = vulncheck_sdk.aio.models.advisory/osv_obj.advisory.OSVObj( affected = [ vulncheck_sdk.aio.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.aio.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.aio.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.aio.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', @@ -116,7 +116,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi modified = '', published = '', references = [ - vulncheck_sdk.aio.models.advisory/osv_reference.advisory.OSVReference( + vulncheck_sdk.aio.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py index 11b29d83..f9a63962 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/own_cloud.advisory.OwnCloud( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py index dfa6366b..62d53a60 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/panasonic.advisory.Panasonic( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py index d8c918b8..a993539b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/phpmy_admin.advisory.PHPMyAdmin( + vulncheck_sdk.aio.models.advisory/binarly.advisory.Binarly( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py index fb29164b..e4409bac 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/pk_cert.advisory.PKCert( + vulncheck_sdk.aio.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py index 004eeccd..b4991d6b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/power_dns.advisory.PowerDNS( + vulncheck_sdk.aio.models.advisory/apache_archiva.advisory.ApacheArchiva( affected = '', cve = [ '' diff --git a/test/aio/test_render_response_with_metadata_array_advisory_progress_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_progress_paginate_pagination.py index 6724c4e9..a79ce42d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_progress_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_progress_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/progress.advisory.Progress( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py index d23b2a88..269e0f7f 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/proofpoint.advisory.Proofpoint( + vulncheck_sdk.aio.models.advisory/netskope.advisory.Netskope( advisory_id = '', cve = [ '' diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ptc_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ptc_paginate_pagination.py index 318b051b..a1f387e8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ptc_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ptc_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/ptc.advisory.PTC( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py index b857ec32..e6ead692 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py @@ -76,14 +76,14 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi advisory_id = '', affected = [ vulncheck_sdk.aio.models.advisory/py_pa_affected.advisory.PyPAAffected( - package = vulncheck_sdk.aio.models.advisory/py_pa_package.advisory.PyPAPackage( + package = vulncheck_sdk.aio.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', purl = '', ), ranges = [ vulncheck_sdk.aio.models.advisory/py_pa_range.advisory.PyPARange( events = [ - vulncheck_sdk.aio.models.advisory/py_pa_event.advisory.PyPAEvent( + vulncheck_sdk.aio.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_qsb_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_qsb_paginate_pagination.py index f8621a44..a4869d16 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_qsb_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_qsb_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/qsb.advisory.QSB( + vulncheck_sdk.aio.models.advisory/binarly.advisory.Binarly( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py index 397231f4..70cb2ed8 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/red_lion.advisory.RedLion( + vulncheck_sdk.aio.models.advisory/grafana.advisory.Grafana( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py index 4844fa22..1e042aae 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/renesas.advisory.Renesas( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py index e7569a84..df68413b 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.aio.models.advisory/rhel_cve.advisory.RhelCVE( csaf = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( @@ -149,7 +211,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_roche_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_roche_paginate_pagination.py index bab7fc84..197ad1df 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_roche_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_roche_paginate_pagination.py @@ -78,7 +78,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi ], date_added = '', roche_cves = [ - vulncheck_sdk.aio.models.advisory/roche_cve.advisory.RocheCVE( + vulncheck_sdk.aio.models.advisory/adobe_cve.advisory.AdobeCVE( cvss_score = '', cvss_vector = '', ) ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_rsync_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_rsync_paginate_pagination.py index 47660855..b8c29d92 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_rsync_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_rsync_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/rsync.advisory.Rsync( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py index 934c7a51..e96ef885 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/ruckus.advisory.Ruckus( + vulncheck_sdk.aio.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_safran_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_safran_paginate_pagination.py index cf17e7a7..ce93ac79 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_safran_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_safran_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/safran.advisory.Safran( + vulncheck_sdk.aio.models.advisory/apache_http.advisory.ApacheHTTP( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py index 56d82b81..653e4cb9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/sandisk.advisory.Sandisk( + vulncheck_sdk.aio.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py index 255b0512..a17df231 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/schutzwerk.advisory.Schutzwerk( + vulncheck_sdk.aio.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py index c23361a1..032dcf41 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/sec_consult.advisory.SECConsult( + vulncheck_sdk.aio.models.advisory/apache_hadoop.advisory.ApacheHadoop( affected = '', cve = [ '' diff --git a/test/aio/test_render_response_with_metadata_array_advisory_service_now_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_service_now_paginate_pagination.py index 1d06a6e4..0500bc2e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_service_now_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_service_now_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/service_now.advisory.ServiceNow( + vulncheck_sdk.aio.models.advisory/apache_commons.advisory.ApacheCommons( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py index ef13f628..4416f21a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/seven_zip.advisory.SevenZip( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_shielder_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_shielder_paginate_pagination.py index 90667f43..383651ef 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_shielder_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_shielder_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/shielder.advisory.Shielder( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py index 3b9bb1d4..e6281de9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py @@ -114,7 +114,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi name = '', namespace = '', ), references = [ - vulncheck_sdk.aio.models.advisory/siemens_references.advisory.SiemensReferences( + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( category = '', summary = '', url = '', ) @@ -123,7 +123,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi tracking = vulncheck_sdk.aio.models.advisory/siemens_tracking.advisory.SiemensTracking( current_release_date = '', generator = vulncheck_sdk.aio.models.advisory/siemens_generator.advisory.SiemensGenerator( - engine = vulncheck_sdk.aio.models.advisory/siemens_engine.advisory.SiemensEngine( + engine = vulncheck_sdk.aio.models.advisory/vulnerable_product.advisory.VulnerableProduct( name = '', version = '', ), ), id = '', @@ -145,7 +145,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/siemens_vulnerability.advisory.SiemensVulnerability( - cwe = vulncheck_sdk.aio.models.advisory/siemens_cwe.advisory.SiemensCWE( + cwe = vulncheck_sdk.aio.models.advisory/cwe.advisory.Cwe( id = '', name = '', ), product_status = vulncheck_sdk.aio.models.advisory/siemens_product_status.advisory.SiemensProductStatus( diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py index a03fbb14..a20ddade 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py @@ -84,7 +84,9 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi author = '', date = '', description = '', - detection = { }, + detection = { + 'key' : null + }, false_positives = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_slackware_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_slackware_paginate_pagination.py index 16af4a75..c151576c 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_slackware_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_slackware_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/slackware.advisory.Slackware( + vulncheck_sdk.aio.models.advisory/autodesk.advisory.Autodesk( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_solr_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_solr_paginate_pagination.py index 1ded59fd..4574e8bb 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_solr_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_solr_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/solr.advisory.Solr( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py index f7a15cf0..79029cf2 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/sonatype.advisory.Sonatype( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py index 2086fb93..41118686 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/spacelabs_healthcare_advisory.advisory.SpacelabsHealthcareAdvisory( + vulncheck_sdk.aio.models.advisory/apache_http.advisory.ApacheHTTP( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py index 779f2717..abbdc053 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/suse_security.advisory.SuseSecurity( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_symfony_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_symfony_paginate_pagination.py index 430dd187..c29fbd19 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_symfony_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_symfony_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/symfony.advisory.Symfony( + vulncheck_sdk.aio.models.advisory/apache_archiva.advisory.ApacheArchiva( affected = '', cve = [ '' diff --git a/test/aio/test_render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py index d6b89ac3..d56e683e 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/synacktiv.advisory.Synacktiv( + vulncheck_sdk.aio.models.advisory/apache_hadoop.advisory.ApacheHadoop( affected = '', cve = [ '' diff --git a/test/aio/test_render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py index 28a8f4f0..59af2b23 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/tailscale.advisory.Tailscale( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py index cad91f27..4a555638 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/thermo_fisher.advisory.ThermoFisher( + vulncheck_sdk.aio.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py index 48601f6e..64ae1636 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/trustwave.advisory.Trustwave( + vulncheck_sdk.aio.models.advisory/binarly.advisory.Binarly( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_update_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_update_paginate_pagination.py index 3e8c03d8..135dce42 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_update_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_update_paginate_pagination.py @@ -79,8 +79,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi date_added = '', description = '', id = '', - issued = vulncheck_sdk.aio.models.advisory/date_time.advisory.DateTime( - date = '', ), + issued = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), os_arch = '', os_version = '', packages = [ @@ -101,8 +100,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi severity = '', title = '', type = '', - updated = vulncheck_sdk.aio.models.advisory/date_time.advisory.DateTime( - date = '', ), ) + updated = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), ) ] ) else: diff --git a/test/aio/test_render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py index 70569763..b80a7587 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/van_dyke.advisory.VanDyke( + vulncheck_sdk.aio.models.advisory/apache_commons.advisory.ApacheCommons( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py index f9b2ba4e..0f4e0342 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.aio.models.advisory/vde_advisory.advisory.VDEAdvisory( csaf_json = vulncheck_sdk.aio.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.aio.models.document.document(), + document = vulncheck_sdk.aio.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.aio.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.aio.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.aio.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.aio.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.aio.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.aio.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.aio.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.aio.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.aio.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.aio.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.aio.models.advisory/remediation_data.advisory.RemediationData( @@ -149,7 +211,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.aio.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vlc_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vlc_paginate_pagination.py index 017459fe..651a4402 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vlc_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vlc_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/vlc.advisory.VLC( + vulncheck_sdk.aio.models.advisory/autodesk.advisory.Autodesk( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py index d1958b5c..bb55e9b9 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/void_sec.advisory.VoidSec( + vulncheck_sdk.aio.models.advisory/apache_commons.advisory.ApacheCommons( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py index d02cb9d6..48d629d4 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/vuln_check_cve_list_v5.advisory.VulnCheckCVEListV5( + vulncheck_sdk.aio.models.advisory/mitre_cve_list_v5.advisory.MitreCVEListV5( cve = [ '' ], @@ -140,7 +140,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -180,7 +180,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi content = vulncheck_sdk.aio.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.aio.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) @@ -188,7 +188,10 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi problem_types = [ vulncheck_sdk.aio.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.aio.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.aio.models.advisory/m_reference.advisory.MReference( name = '', @@ -209,7 +212,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi nodes = [ vulncheck_sdk.aio.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.aio.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.aio.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', @@ -229,10 +232,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.aio.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.aio.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py index b34b09e7..22642c45 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py @@ -90,7 +90,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi short_description = '', vendor_project = '', vulncheck_reported_exploitation = [ - vulncheck_sdk.aio.models.advisory/reported_exploit.advisory.ReportedExploit( + vulncheck_sdk.aio.models.advisory/mitre_attack_ref.advisory.MitreAttackRef( date_added = '', url = '', ) ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py index 985c4132..d0372c9d 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py @@ -133,7 +133,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi nodes = [ vulncheck_sdk.aio.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.aio.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.aio.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', diff --git a/test/aio/test_render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py index 0c5f830c..c1f6d451 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/vyaire_advisory.advisory.VYAIREAdvisory( + vulncheck_sdk.aio.models.advisory/apache_http.advisory.ApacheHTTP( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py index bf38e218..cec7c6b6 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/whats_app.advisory.WhatsApp( + vulncheck_sdk.aio.models.advisory/apache_shiro.advisory.ApacheShiro( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_wibu_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_wibu_paginate_pagination.py index 6743008b..a5fee73a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_wibu_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_wibu_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/wibu.advisory.Wibu( + vulncheck_sdk.aio.models.advisory/autodesk.advisory.Autodesk( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py index 0087a389..1d21fefc 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/wireshark.advisory.Wireshark( + vulncheck_sdk.aio.models.advisory/revive.advisory.Revive( affected = '', cve = [ '' diff --git a/test/aio/test_render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py index 60ea8812..389a5f72 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/with_secure.advisory.WithSecure( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py index 381400ab..ba84cac1 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py @@ -82,7 +82,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vulncheck_sdk.aio.models.advisory/wolfi_package.advisory.WolfiPackage( name = '', secfixes = [ - vulncheck_sdk.aio.models.advisory/wolfi_sec_fix.advisory.WolfiSecFix( + vulncheck_sdk.aio.models.advisory/chain_guard_sec_fix.advisory.ChainGuardSecFix( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_xerox_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_xerox_paginate_pagination.py index ddb797b4..fa90a3c0 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_xerox_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_xerox_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/xerox.advisory.Xerox( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_yubico_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_yubico_paginate_pagination.py index 6c91da67..d451d1c2 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_yubico_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_yubico_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/yubico.advisory.Yubico( + vulncheck_sdk.aio.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_zebra_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_zebra_paginate_pagination.py index bf9b37fa..f1879d2a 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_zebra_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_zebra_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/zebra.advisory.Zebra( + vulncheck_sdk.aio.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py index c2ad5aca..fa6aae09 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/zscaler.advisory.Zscaler( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py index 03905674..75822844 100644 --- a/test/aio/test_render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.aio.models.advisory/zyxel.advisory.Zyxel( + vulncheck_sdk.aio.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py index d1a1db14..1d275a51 100644 --- a/test/aio/test_render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py @@ -125,7 +125,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiC data_version = '', description = vulncheck_sdk.aio.models.api/description.api.Description( description_data = [ - vulncheck_sdk.aio.models.api/description_data.api.DescriptionData( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ), @@ -168,7 +168,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiC severity = '', user_interaction_required = True, ), base_metric_v3 = vulncheck_sdk.aio.models.api/base_metric_v3.api.BaseMetricV3( - cvss_v3 = vulncheck_sdk.aio.models.api/cvssv3.api.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -276,7 +276,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiC ], published_date = '', related_attack_patterns = [ - vulncheck_sdk.aio.models.api/related_attack_pattern.api.RelatedAttackPattern( + vulncheck_sdk.aio.models.advisory/capec.advisory.Capec( capec_id = '', capec_name = '', capec_url = '', diff --git a/test/aio/test_render_response_with_metadata_array_api_cve_items_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_cve_items_paginate_pagination.py index d9476b24..1f154d88 100644 --- a/test/aio/test_render_response_with_metadata_array_api_cve_items_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_cve_items_paginate_pagination.py @@ -118,7 +118,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiC data_version = '', description = vulncheck_sdk.aio.models.api/description.api.Description( description_data = [ - vulncheck_sdk.aio.models.api/description_data.api.DescriptionData( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ), @@ -157,7 +157,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiC severity = '', user_interaction_required = True, ), base_metric_v3 = vulncheck_sdk.aio.models.api/base_metric_v3.api.BaseMetricV3( - cvss_v3 = vulncheck_sdk.aio.models.api/cvssv3.api.CVSSV3( + cvss_v3 = vulncheck_sdk.aio.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -172,7 +172,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiC version = '', ), exploitability_score = 1.337, impact_score = 1.337, ), - metric_v40 = vulncheck_sdk.aio.models.metric_v40.metricV40(), ), + metric_v40 = vulncheck_sdk.aio.models.advisory/cvssv40.advisory.CVSSV40( + automatable = '', + recovery = '', + safety = '', + attack_complexity = '', + attack_requirements = '', + attack_vector = '', + availability_requirement = '', + base_score = 1.337, + base_severity = '', + confidentiality_requirement = '', + exploit_maturity = '', + integrity_requirement = '', + modified_attack_complexity = '', + modified_attack_requirements = '', + modified_attack_vector = '', + modified_privileges_required = '', + modified_sub_availability_impact = '', + modified_sub_confidentiality_impact = '', + modified_sub_integrity_impact = '', + modified_user_interaction = '', + modified_vuln_availability_impact = '', + modified_vuln_confidentiality_impact = '', + modified_vuln_integrity_impact = '', + privileges_required = '', + provider_urgency = '', + sub_availability_impact = '', + sub_confidentiality_impact = '', + sub_integrity_impact = '', + user_interaction = '', + value_density = '', + vector_string = '', + version = '', + vuln_availability_impact = '', + vuln_confidentiality_impact = '', + vuln_integrity_impact = '', + vulnerability_response_effort = '', ), ), last_modified_date = '', published_date = '', vc_configurations = vulncheck_sdk.aio.models.api/configurations.api.Configurations( diff --git a/test/aio/test_render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py index a75d2438..2c3fc02c 100644 --- a/test/aio/test_render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py @@ -81,7 +81,10 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiE ransomware_families = 56, threat_actors = 56, ), date_added = '', - epss = vulncheck_sdk.aio.models.epss.epss(), + epss = vulncheck_sdk.aio.models.api/epss.api.EPSS( + epss_percentile = 1.337, + epss_score = 1.337, + last_modified = '', ), exploits = [ vulncheck_sdk.aio.models.api/normalized_exploit_v3_entry.api.NormalizedExploitV3Entry( clone_ssh_url = '', diff --git a/test/aio/test_render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py index 4ec97196..48c2beb8 100644 --- a/test/aio/test_render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py @@ -78,8 +78,8 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiE change_time = '', change_type = '', field = '', - new_value = vulncheck_sdk.aio.models.new_value.new_value(), - old_value = vulncheck_sdk.aio.models.old_value.old_value(), ) + new_value = null, + old_value = null, ) ], cve = '', ) ] diff --git a/test/aio/test_render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py index 831d75e1..e306911e 100644 --- a/test/aio/test_render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py @@ -106,7 +106,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiN ], date_added = '', descriptions = [ - vulncheck_sdk.aio.models.api/nvd20_description.api.NVD20Description( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], @@ -225,10 +225,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiN ], threat_cvssv40 = vulncheck_sdk.aio.models.api/nvd20_threat_cvssv40.api.NVD20ThreatCVSSV40( - associated_base_metric_v40 = vulncheck_sdk.aio.models.api/nvd20_threat_associated_base_metric.api.NVD20ThreatAssociatedBaseMetric( - base_score = 1.337, - source = '', - type = '', ), + associated_base_metric_v40 = , base_threat_score = 1.337, base_threat_severity = '', exploit_maturity = '', ), @@ -285,7 +282,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiN url = '', ) ], related_attack_patterns = [ - vulncheck_sdk.aio.models.api/related_attack_pattern.api.RelatedAttackPattern( + vulncheck_sdk.aio.models.advisory/capec.advisory.Capec( capec_id = '', capec_name = '', capec_url = '', @@ -314,7 +311,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiN weaknesses = [ vulncheck_sdk.aio.models.api/nvd20_weakness_extended.api.NVD20WeaknessExtended( description = [ - vulncheck_sdk.aio.models.api/nvd20_weakness_desc_extended.api.NVD20WeaknessDescExtended( + vulncheck_sdk.aio.models.advisory/cwe_data.advisory.CweData( lang = '', name = '', url = '', diff --git a/test/aio/test_render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py index 29457070..71124a89 100644 --- a/test/aio/test_render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py @@ -98,7 +98,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiN operator = '', ) ], descriptions = [ - vulncheck_sdk.aio.models.api/nvd20_description.api.NVD20Description( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], @@ -188,7 +188,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiN weaknesses = [ vulncheck_sdk.aio.models.api/nvd20_weakness.api.NVD20Weakness( description = [ - vulncheck_sdk.aio.models.api/nvd20_description.api.NVD20Description( + vulncheck_sdk.aio.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], diff --git a/test/aio/test_render_response_with_metadata_array_api_update_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_api_update_paginate_pagination.py index 4e77ffc8..037e2ad5 100644 --- a/test/aio/test_render_response_with_metadata_array_api_update_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_api_update_paginate_pagination.py @@ -79,12 +79,11 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiU date_added = '', description = '', id = '', - issued = vulncheck_sdk.aio.models.api/date_time.api.DateTime( - date = '', ), + issued = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), os_arch = '', os_version = '', packages = [ - vulncheck_sdk.aio.models.api/package.api.Package( + vulncheck_sdk.aio.models.advisory/package.advisory.Package( filename = '', name = '', release = '', @@ -92,7 +91,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiU version = '', ) ], references = [ - vulncheck_sdk.aio.models.api/reference.api.Reference( + vulncheck_sdk.aio.models.advisory/reference.advisory.Reference( href = '', id = '', title = '', @@ -101,8 +100,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiU severity = '', title = '', type = '', - updated = vulncheck_sdk.aio.models.api/date_time.api.DateTime( - date = '', ), ) + updated = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), ) ] ) else: diff --git a/test/aio/test_render_response_with_metadata_array_purls_purl_response_paginate_pagination.py b/test/aio/test_render_response_with_metadata_array_purls_purl_response_paginate_pagination.py index 3a2a96b5..67ad27e9 100644 --- a/test/aio/test_render_response_with_metadata_array_purls_purl_response_paginate_pagination.py +++ b/test/aio/test_render_response_with_metadata_array_purls_purl_response_paginate_pagination.py @@ -73,7 +73,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayPurl ], ), data = [ vulncheck_sdk.aio.models.purls/purl_response.purls.PurlResponse( - artifacts = vulncheck_sdk.aio.models.artifacts.artifacts(), + artifacts = vulncheck_sdk.aio.models.advisory/csaf_distribution.advisory.CSAFDistribution(), cves = [ '' ], diff --git a/test/aio/test_render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py b/test/aio/test_render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py index 706bf6e9..33df3763 100644 --- a/test/aio/test_render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py +++ b/test/aio/test_render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py @@ -38,7 +38,17 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataV3control return RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata( benchmark = 1.337, meta = vulncheck_sdk.aio.models.v3controllers/purl_response_metadata.v3controllers.PurlResponseMetadata( - purl_struct = vulncheck_sdk.aio.models.purl_struct.purl_struct(), + purl_struct = vulncheck_sdk.aio.models.purl/package_urljson.purl.PackageURLJSON( + name = '', + namespace = '', + qualifiers = [ + vulncheck_sdk.aio.models.purl/qualifier_json.purl.QualifierJSON( + key = '', + value = '', ) + ], + subpath = '', + type = '', + version = '', ), timestamp = '', total_documents = 56, ), data = vulncheck_sdk.aio.models.v3controllers/purl_response_data.v3controllers.PurlResponseData( diff --git a/test/aio/test_render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py b/test/aio/test_render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py index cd77940e..d318e1e3 100644 --- a/test/aio/test_render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py +++ b/test/aio/test_render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py @@ -46,7 +46,17 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataV3control '' ], purl = '', - purl_struct = vulncheck_sdk.aio.models.purl_struct.purl_struct(), + purl_struct = vulncheck_sdk.aio.models.purl/package_urljson.purl.PackageURLJSON( + name = '', + namespace = '', + qualifiers = [ + vulncheck_sdk.aio.models.purl/qualifier_json.purl.QualifierJSON( + key = '', + value = '', ) + ], + subpath = '', + type = '', + version = '', ), research_attributes = vulncheck_sdk.aio.models.api/oss_package_research_attributes.api.OSSPackageResearchAttributes( abandoned = True, eol = True, diff --git a/test/blocking/test_advisory_adobe_advisory.py b/test/blocking/test_advisory_adobe_advisory.py index e796b586..ed33362b 100644 --- a/test/blocking/test_advisory_adobe_advisory.py +++ b/test/blocking/test_advisory_adobe_advisory.py @@ -55,7 +55,7 @@ def make_instance(self, include_optional) -> AdvisoryAdobeAdvisory: date_added = '', link = '', solutions = [ - vulncheck_sdk.models.advisory/adobe_solution.advisory.AdobeSolution( + vulncheck_sdk.models.advisory/adobe_affected.advisory.AdobeAffected( platform = '', product = '', version = '', ) diff --git a/test/blocking/test_advisory_adp_container.py b/test/blocking/test_advisory_adp_container.py index 2bc34a6b..ad57e05c 100644 --- a/test/blocking/test_advisory_adp_container.py +++ b/test/blocking/test_advisory_adp_container.py @@ -100,7 +100,7 @@ def make_instance(self, include_optional) -> AdvisoryADPContainer: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -140,7 +140,7 @@ def make_instance(self, include_optional) -> AdvisoryADPContainer: content = vulncheck_sdk.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) diff --git a/test/blocking/test_advisory_advisory_details.py b/test/blocking/test_advisory_advisory_details.py index 68f5a34c..4eb42823 100644 --- a/test/blocking/test_advisory_advisory_details.py +++ b/test/blocking/test_advisory_advisory_details.py @@ -40,15 +40,13 @@ def make_instance(self, include_optional) -> AdvisoryAdvisoryDetails: href = '', id = '', title = '', ), - cve = vulncheck_sdk.models.advisory/oval_cve.advisory.OvalCVE( + cve = vulncheck_sdk.models.advisory/bugzilla.advisory.Bugzilla( href = '', id = '', title = '', ), - issued = vulncheck_sdk.models.advisory/issued.advisory.Issued( - date = '', ), + issued = None, severity = '', - updated = vulncheck_sdk.models.advisory/updated.advisory.Updated( - date = '', ) + updated = None ) else: return AdvisoryAdvisoryDetails( diff --git a/test/blocking/test_advisory_bdu_advisory.py b/test/blocking/test_advisory_bdu_advisory.py index 10201370..d2414131 100644 --- a/test/blocking/test_advisory_bdu_advisory.py +++ b/test/blocking/test_advisory_bdu_advisory.py @@ -44,7 +44,7 @@ def make_instance(self, include_optional) -> AdvisoryBDUAdvisory: vector = vulncheck_sdk.models.advisory/bdu_vector.advisory.BDUVector( score = '', text = '', ), ), - cvss3 = vulncheck_sdk.models.advisory/bdu_cvss3.advisory.BDUCvss3( + cvss3 = vulncheck_sdk.models.advisory/bdu_cvss.advisory.BDUCvss( vector = vulncheck_sdk.models.advisory/bdu_vector.advisory.BDUVector( score = '', text = '', ), ), diff --git a/test/blocking/test_advisory_botnet.py b/test/blocking/test_advisory_botnet.py index 4f1eec3c..9ca08dce 100644 --- a/test/blocking/test_advisory_botnet.py +++ b/test/blocking/test_advisory_botnet.py @@ -96,7 +96,7 @@ def make_instance(self, include_optional) -> AdvisoryBotnet: vulncheck_sdk.models.advisory/tool.advisory.Tool( name = '', references = [ - vulncheck_sdk.models.advisory/tool_ref.advisory.ToolRef( + vulncheck_sdk.models.advisory/mitre_attack_ref.advisory.MitreAttackRef( date_added = '', url = '', ) ], ) diff --git a/test/blocking/test_advisory_cisa_csaf_adv.py b/test/blocking/test_advisory_cisa_csaf_adv.py index 3f5ba25d..c094b507 100644 --- a/test/blocking/test_advisory_cisa_csaf_adv.py +++ b/test/blocking/test_advisory_cisa_csaf_adv.py @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryCisaCsafAdv: if include_optional: return AdvisoryCisaCsafAdv( csaf_json = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryCisaCsafAdv: text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryCisaCsafAdv: '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( @@ -112,7 +171,7 @@ def make_instance(self, include_optional) -> AdvisoryCisaCsafAdv: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_advisory_csaf.py b/test/blocking/test_advisory_csaf.py index 80b7ae5b..88e82d4a 100644 --- a/test/blocking/test_advisory_csaf.py +++ b/test/blocking/test_advisory_csaf.py @@ -88,7 +88,9 @@ def make_instance(self, include_optional) -> AdvisoryCSAF: product = vulncheck_sdk.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), relationships = [ vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( category = '', @@ -181,7 +183,7 @@ def make_instance(self, include_optional) -> AdvisoryCSAF: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_advisory_csaf_relationship.py b/test/blocking/test_advisory_csaf_relationship.py index 9a08144f..0b859ee4 100644 --- a/test/blocking/test_advisory_csaf_relationship.py +++ b/test/blocking/test_advisory_csaf_relationship.py @@ -40,7 +40,9 @@ def make_instance(self, include_optional) -> AdvisoryCSAFRelationship: full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), product_reference = '', relates_to_product_reference = '' ) diff --git a/test/blocking/test_advisory_csaf_score.py b/test/blocking/test_advisory_csaf_score.py index 0bac159c..5adb9e42 100644 --- a/test/blocking/test_advisory_csaf_score.py +++ b/test/blocking/test_advisory_csaf_score.py @@ -54,7 +54,7 @@ def make_instance(self, include_optional) -> AdvisoryCSAFScore: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_advisory_csaf_vulnerability.py b/test/blocking/test_advisory_csaf_vulnerability.py index e039bf45..a8dc57b0 100644 --- a/test/blocking/test_advisory_csaf_vulnerability.py +++ b/test/blocking/test_advisory_csaf_vulnerability.py @@ -113,7 +113,7 @@ def make_instance(self, include_optional) -> AdvisoryCSAFVulnerability: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_advisory_cvrf.py b/test/blocking/test_advisory_cvrf.py index f907309d..21b9fcde 100644 --- a/test/blocking/test_advisory_cvrf.py +++ b/test/blocking/test_advisory_cvrf.py @@ -38,72 +38,6 @@ def make_instance(self, include_optional) -> AdvisoryCvrf: return AdvisoryCvrf( cve = [ '' - ], - notes = [ - vulncheck_sdk.models.advisory/document_note.advisory.DocumentNote( - text = '', - title = '', - type = '', ) - ], - product_tree = vulncheck_sdk.models.advisory/product_tree.advisory.ProductTree( - relationships = [ - vulncheck_sdk.models.advisory/relationship.advisory.Relationship( - product_reference = '', - relates_to_product_reference = '', - relation_type = '', ) - ], ), - references = [ - vulncheck_sdk.models.advisory/cvrf_reference.advisory.CVRFReference( - description = '', - url = '', ) - ], - title = '', - tracking = vulncheck_sdk.models.advisory/document_tracking.advisory.DocumentTracking( - current_release_date = '', - id = '', - initial_release_date = '', - revision_history = [ - vulncheck_sdk.models.advisory/revision.advisory.Revision( - date = '', - description = '', - number = '', ) - ], - status = '', - version = '', ), - vulnerabilities = [ - vulncheck_sdk.models.advisory/vulnerability.advisory.Vulnerability( - cve = '', - cvssscore_sets = vulncheck_sdk.models.advisory/score_set.advisory.ScoreSet( - base_score = '', - vector = '', ), - description = '', - packages = [ - vulncheck_sdk.models.advisory/vuln_check_package.advisory.VulnCheckPackage( - arch = '', - distro = '', - filename = '', - md5 = '', - name = '', - purl = '', - version = '', ) - ], - product_statuses = [ - vulncheck_sdk.models.advisory/status.advisory.Status( - product_id = [ - '' - ], - type = '', ) - ], - references = [ - vulncheck_sdk.models.advisory/cvrf_reference.advisory.CVRFReference( - description = '', - url = '', ) - ], - threats = [ - vulncheck_sdk.models.advisory/threat.advisory.Threat( - severity = '', - type = '', ) - ], ) ] ) else: diff --git a/test/blocking/test_advisory_cvrf_reference.py b/test/blocking/test_advisory_cvrf_reference.py deleted file mode 100644 index da69b4a5..00000000 --- a/test/blocking/test_advisory_cvrf_reference.py +++ /dev/null @@ -1,53 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_cvrf_reference import AdvisoryCVRFReference - -class TestAdvisoryCVRFReference(unittest.TestCase): - """AdvisoryCVRFReference unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryCVRFReference: - """Test AdvisoryCVRFReference - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryCVRFReference` - """ - model = AdvisoryCVRFReference() - if include_optional: - return AdvisoryCVRFReference( - description = '', - url = '' - ) - else: - return AdvisoryCVRFReference( - ) - """ - - def testAdvisoryCVRFReference(self): - """Test AdvisoryCVRFReference""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_cwe_node.py b/test/blocking/test_advisory_cwe_node.py deleted file mode 100644 index 3362843d..00000000 --- a/test/blocking/test_advisory_cwe_node.py +++ /dev/null @@ -1,55 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_cwe_node import AdvisoryCWENode - -class TestAdvisoryCWENode(unittest.TestCase): - """AdvisoryCWENode unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryCWENode: - """Test AdvisoryCWENode - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryCWENode` - """ - model = AdvisoryCWENode() - if include_optional: - return AdvisoryCWENode( - cweid = '', - description = '', - id = '', - name = '' - ) - else: - return AdvisoryCWENode( - ) - """ - - def testAdvisoryCWENode(self): - """Test AdvisoryCWENode""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_cwes.py b/test/blocking/test_advisory_cwes.py index e4950011..082bd266 100644 --- a/test/blocking/test_advisory_cwes.py +++ b/test/blocking/test_advisory_cwes.py @@ -37,13 +37,8 @@ def make_instance(self, include_optional) -> AdvisoryCwes: if include_optional: return AdvisoryCwes( nodes = [ - vulncheck_sdk.models.advisory/cwe_node.advisory.CWENode( - cweid = '', - description = '', - id = '', - name = '', ) - ], - total_count = 56 + vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution() + ] ) else: return AdvisoryCwes( diff --git a/test/blocking/test_advisory_date_time.py b/test/blocking/test_advisory_date_time.py deleted file mode 100644 index dc96a24b..00000000 --- a/test/blocking/test_advisory_date_time.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_date_time import AdvisoryDateTime - -class TestAdvisoryDateTime(unittest.TestCase): - """AdvisoryDateTime unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryDateTime: - """Test AdvisoryDateTime - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryDateTime` - """ - model = AdvisoryDateTime() - if include_optional: - return AdvisoryDateTime( - var_date = '' - ) - else: - return AdvisoryDateTime( - ) - """ - - def testAdvisoryDateTime(self): - """Test AdvisoryDateTime""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_debian_security_advisory.py b/test/blocking/test_advisory_debian_security_advisory.py index ec4bdf61..6ce150f3 100644 --- a/test/blocking/test_advisory_debian_security_advisory.py +++ b/test/blocking/test_advisory_debian_security_advisory.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> AdvisoryDebianSecurityAdvisory: if include_optional: return AdvisoryDebianSecurityAdvisory( affected_packages = [ - vulncheck_sdk.models.advisory/affected_debian_package.advisory.AffectedDebianPackage( + vulncheck_sdk.models.advisory/vulnerable_product.advisory.VulnerableProduct( name = '', version = '', ) ], diff --git a/test/blocking/test_advisory_dell.py b/test/blocking/test_advisory_dell.py index 254b9d3d..103eaf11 100644 --- a/test/blocking/test_advisory_dell.py +++ b/test/blocking/test_advisory_dell.py @@ -43,7 +43,7 @@ def make_instance(self, include_optional) -> AdvisoryDell: ], date_added = '', dell_cves = [ - vulncheck_sdk.models.advisory/dell_cve.advisory.DellCVE( + vulncheck_sdk.models.advisory/adobe_cve.advisory.AdobeCVE( cve = '', cvss_score = '', cvss_vector = '', ) diff --git a/test/blocking/test_advisory_document_note.py b/test/blocking/test_advisory_document_note.py deleted file mode 100644 index 50648bbc..00000000 --- a/test/blocking/test_advisory_document_note.py +++ /dev/null @@ -1,54 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_document_note import AdvisoryDocumentNote - -class TestAdvisoryDocumentNote(unittest.TestCase): - """AdvisoryDocumentNote unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryDocumentNote: - """Test AdvisoryDocumentNote - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryDocumentNote` - """ - model = AdvisoryDocumentNote() - if include_optional: - return AdvisoryDocumentNote( - text = '', - title = '', - type = '' - ) - else: - return AdvisoryDocumentNote( - ) - """ - - def testAdvisoryDocumentNote(self): - """Test AdvisoryDocumentNote""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_document_tracking.py b/test/blocking/test_advisory_document_tracking.py deleted file mode 100644 index 9c8e37d2..00000000 --- a/test/blocking/test_advisory_document_tracking.py +++ /dev/null @@ -1,62 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_document_tracking import AdvisoryDocumentTracking - -class TestAdvisoryDocumentTracking(unittest.TestCase): - """AdvisoryDocumentTracking unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryDocumentTracking: - """Test AdvisoryDocumentTracking - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryDocumentTracking` - """ - model = AdvisoryDocumentTracking() - if include_optional: - return AdvisoryDocumentTracking( - current_release_date = '', - id = '', - initial_release_date = '', - revision_history = [ - vulncheck_sdk.models.advisory/revision.advisory.Revision( - date = '', - description = '', - number = '', ) - ], - status = '', - version = '' - ) - else: - return AdvisoryDocumentTracking( - ) - """ - - def testAdvisoryDocumentTracking(self): - """Test AdvisoryDocumentTracking""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_end_of_life.py b/test/blocking/test_advisory_end_of_life.py index 70ebac69..e2778482 100644 --- a/test/blocking/test_advisory_end_of_life.py +++ b/test/blocking/test_advisory_end_of_life.py @@ -43,16 +43,16 @@ def make_instance(self, include_optional) -> AdvisoryEndOfLife: vulncheck_sdk.models.advisory/cycle.advisory.Cycle( codename = '', cycle = '', - discontinued = vulncheck_sdk.models.discontinued.discontinued(), - eol = vulncheck_sdk.models.eol.eol(), - extended_support = vulncheck_sdk.models.extended_support.extendedSupport(), + discontinued = null, + eol = null, + extended_support = null, latest = '', latest_release_date = '', link = '', - lts = vulncheck_sdk.models.lts.lts(), + lts = null, release_date = '', release_label = '', - support = vulncheck_sdk.models.support.support(), ) + support = null, ) ], date_added = '', name = '', diff --git a/test/blocking/test_advisory_gh_advisory_json_lean.py b/test/blocking/test_advisory_gh_advisory_json_lean.py index 5f1ffe7e..78aa32b9 100644 --- a/test/blocking/test_advisory_gh_advisory_json_lean.py +++ b/test/blocking/test_advisory_gh_advisory_json_lean.py @@ -45,13 +45,8 @@ def make_instance(self, include_optional) -> AdvisoryGHAdvisoryJSONLean: vector_string = '', ), cwes = vulncheck_sdk.models.advisory/cwes.advisory.Cwes( nodes = [ - vulncheck_sdk.models.advisory/cwe_node.advisory.CWENode( - cweid = '', - description = '', - id = '', - name = '', ) - ], - total_count = 56, ), + vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution() + ], ), database_id = 56, date_added = '', description = '', @@ -76,7 +71,7 @@ def make_instance(self, include_optional) -> AdvisoryGHAdvisoryJSONLean: vulnerabilities = vulncheck_sdk.models.advisory/gh_vulnerabilities.advisory.GHVulnerabilities( nodes = [ vulncheck_sdk.models.advisory/gh_node.advisory.GHNode( - package = vulncheck_sdk.models.advisory/gh_package.advisory.GHPackage( + package = vulncheck_sdk.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), severity = '', diff --git a/test/blocking/test_advisory_gh_node.py b/test/blocking/test_advisory_gh_node.py index 18c66835..9f69a433 100644 --- a/test/blocking/test_advisory_gh_node.py +++ b/test/blocking/test_advisory_gh_node.py @@ -36,7 +36,7 @@ def make_instance(self, include_optional) -> AdvisoryGHNode: model = AdvisoryGHNode() if include_optional: return AdvisoryGHNode( - package = vulncheck_sdk.models.advisory/gh_package.advisory.GHPackage( + package = vulncheck_sdk.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), severity = '', diff --git a/test/blocking/test_advisory_gh_vulnerabilities.py b/test/blocking/test_advisory_gh_vulnerabilities.py index 3d325fd4..beaeb579 100644 --- a/test/blocking/test_advisory_gh_vulnerabilities.py +++ b/test/blocking/test_advisory_gh_vulnerabilities.py @@ -38,7 +38,7 @@ def make_instance(self, include_optional) -> AdvisoryGHVulnerabilities: return AdvisoryGHVulnerabilities( nodes = [ vulncheck_sdk.models.advisory/gh_node.advisory.GHNode( - package = vulncheck_sdk.models.advisory/gh_package.advisory.GHPackage( + package = vulncheck_sdk.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), severity = '', diff --git a/test/blocking/test_advisory_ghsa.py b/test/blocking/test_advisory_ghsa.py index c1d28d69..4fa1d6bb 100644 --- a/test/blocking/test_advisory_ghsa.py +++ b/test/blocking/test_advisory_ghsa.py @@ -47,13 +47,13 @@ def make_instance(self, include_optional) -> AdvisoryGHSA: affected_functions = [ '' ], ), - package = vulncheck_sdk.models.advisory/ghsa_package.advisory.GHSAPackage( + package = vulncheck_sdk.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), ranges = [ vulncheck_sdk.models.advisory/ghsa_range.advisory.GHSARange( events = [ - vulncheck_sdk.models.advisory/ghsa_event.advisory.GHSAEvent( + vulncheck_sdk.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], @@ -76,13 +76,13 @@ def make_instance(self, include_optional) -> AdvisoryGHSA: modified = '', published = '', references = [ - vulncheck_sdk.models.advisory/ghsa_reference.advisory.GHSAReference( + vulncheck_sdk.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], schema_version = '', severity = [ - vulncheck_sdk.models.advisory/ghsa_severity.advisory.GHSASeverity( + vulncheck_sdk.models.advisory/severity.advisory.Severity( score = '', type = '', ) ], diff --git a/test/blocking/test_advisory_ghsa_affected.py b/test/blocking/test_advisory_ghsa_affected.py index cbb17b3f..4be8c0b2 100644 --- a/test/blocking/test_advisory_ghsa_affected.py +++ b/test/blocking/test_advisory_ghsa_affected.py @@ -40,13 +40,13 @@ def make_instance(self, include_optional) -> AdvisoryGHSAAffected: affected_functions = [ '' ], ), - package = vulncheck_sdk.models.advisory/ghsa_package.advisory.GHSAPackage( + package = vulncheck_sdk.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), ranges = [ vulncheck_sdk.models.advisory/ghsa_range.advisory.GHSARange( events = [ - vulncheck_sdk.models.advisory/ghsa_event.advisory.GHSAEvent( + vulncheck_sdk.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/blocking/test_advisory_ghsa_range.py b/test/blocking/test_advisory_ghsa_range.py index fed5e031..ddae7f36 100644 --- a/test/blocking/test_advisory_ghsa_range.py +++ b/test/blocking/test_advisory_ghsa_range.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> AdvisoryGHSARange: if include_optional: return AdvisoryGHSARange( events = [ - vulncheck_sdk.models.advisory/ghsa_event.advisory.GHSAEvent( + vulncheck_sdk.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/blocking/test_advisory_go_vuln_affected.py b/test/blocking/test_advisory_go_vuln_affected.py index b368a237..4dbe8d6d 100644 --- a/test/blocking/test_advisory_go_vuln_affected.py +++ b/test/blocking/test_advisory_go_vuln_affected.py @@ -36,7 +36,7 @@ def make_instance(self, include_optional) -> AdvisoryGoVulnAffected: model = AdvisoryGoVulnAffected() if include_optional: return AdvisoryGoVulnAffected( - database_specific = vulncheck_sdk.models.advisory/go_vuln_database_specific.advisory.GoVulnDatabaseSpecific( + database_specific = vulncheck_sdk.models.advisory/gh_reference.advisory.GHReference( url = '', ), ecosystem_specific = vulncheck_sdk.models.advisory/go_vuln_ecosystem_specific.advisory.GoVulnEcosystemSpecific( imports = [ @@ -46,13 +46,13 @@ def make_instance(self, include_optional) -> AdvisoryGoVulnAffected: '' ], ) ], ), - package = vulncheck_sdk.models.advisory/go_vuln_package.advisory.GoVulnPackage( + package = vulncheck_sdk.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), ranges = [ vulncheck_sdk.models.advisory/go_vuln_ranges.advisory.GoVulnRanges( events = [ - vulncheck_sdk.models.advisory/go_event.advisory.GoEvent( + vulncheck_sdk.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/blocking/test_advisory_go_vuln_json.py b/test/blocking/test_advisory_go_vuln_json.py index 3b816a84..8feb3cc4 100644 --- a/test/blocking/test_advisory_go_vuln_json.py +++ b/test/blocking/test_advisory_go_vuln_json.py @@ -39,7 +39,7 @@ def make_instance(self, include_optional) -> AdvisoryGoVulnJSON: advisory_url = '', affected = [ vulncheck_sdk.models.advisory/go_vuln_affected.advisory.GoVulnAffected( - database_specific = vulncheck_sdk.models.advisory/go_vuln_database_specific.advisory.GoVulnDatabaseSpecific( + database_specific = vulncheck_sdk.models.advisory/gh_reference.advisory.GHReference( url = '', ), ecosystem_specific = vulncheck_sdk.models.advisory/go_vuln_ecosystem_specific.advisory.GoVulnEcosystemSpecific( imports = [ @@ -49,13 +49,13 @@ def make_instance(self, include_optional) -> AdvisoryGoVulnJSON: '' ], ) ], ), - package = vulncheck_sdk.models.advisory/go_vuln_package.advisory.GoVulnPackage( + package = vulncheck_sdk.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), ranges = [ vulncheck_sdk.models.advisory/go_vuln_ranges.advisory.GoVulnRanges( events = [ - vulncheck_sdk.models.advisory/go_event.advisory.GoEvent( + vulncheck_sdk.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], @@ -81,7 +81,7 @@ def make_instance(self, include_optional) -> AdvisoryGoVulnJSON: modified = '', published = '', references = [ - vulncheck_sdk.models.advisory/go_vuln_reference.advisory.GoVulnReference( + vulncheck_sdk.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ] diff --git a/test/blocking/test_advisory_go_vuln_ranges.py b/test/blocking/test_advisory_go_vuln_ranges.py index 385bc9ac..7f8e2d67 100644 --- a/test/blocking/test_advisory_go_vuln_ranges.py +++ b/test/blocking/test_advisory_go_vuln_ranges.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> AdvisoryGoVulnRanges: if include_optional: return AdvisoryGoVulnRanges( events = [ - vulncheck_sdk.models.advisory/go_event.advisory.GoEvent( + vulncheck_sdk.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/blocking/test_advisory_haskell_affected.py b/test/blocking/test_advisory_haskell_affected.py index 5a5917c1..6ae799dd 100644 --- a/test/blocking/test_advisory_haskell_affected.py +++ b/test/blocking/test_advisory_haskell_affected.py @@ -38,7 +38,7 @@ def make_instance(self, include_optional) -> AdvisoryHaskellAffected: return AdvisoryHaskellAffected( affected_constraint = '', affected_versions = [ - vulncheck_sdk.models.advisory/haskell_version.advisory.HaskellVersion( + vulncheck_sdk.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/blocking/test_advisory_haskell_sadb_advisory.py b/test/blocking/test_advisory_haskell_sadb_advisory.py index e9ab5743..bfa9011c 100644 --- a/test/blocking/test_advisory_haskell_sadb_advisory.py +++ b/test/blocking/test_advisory_haskell_sadb_advisory.py @@ -41,7 +41,7 @@ def make_instance(self, include_optional) -> AdvisoryHaskellSADBAdvisory: vulncheck_sdk.models.advisory/haskell_affected.advisory.HaskellAffected( affected_constraint = '', affected_versions = [ - vulncheck_sdk.models.advisory/haskell_version.advisory.HaskellVersion( + vulncheck_sdk.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/blocking/test_advisory_issued.py b/test/blocking/test_advisory_issued.py deleted file mode 100644 index 84bed2bf..00000000 --- a/test/blocking/test_advisory_issued.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_issued import AdvisoryIssued - -class TestAdvisoryIssued(unittest.TestCase): - """AdvisoryIssued unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryIssued: - """Test AdvisoryIssued - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryIssued` - """ - model = AdvisoryIssued() - if include_optional: - return AdvisoryIssued( - var_date = '' - ) - else: - return AdvisoryIssued( - ) - """ - - def testAdvisoryIssued(self): - """Test AdvisoryIssued""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_lol_advs.py b/test/blocking/test_advisory_lol_advs.py index a12d9d8a..8fd54870 100644 --- a/test/blocking/test_advisory_lol_advs.py +++ b/test/blocking/test_advisory_lol_advs.py @@ -43,7 +43,7 @@ def make_instance(self, include_optional) -> AdvisoryLolAdvs: description = '', id = '', lol_json = { - 'key' : None + 'key' : null }, mitre_id = '', references = [ diff --git a/test/blocking/test_advisory_m_cna.py b/test/blocking/test_advisory_m_cna.py index 5988f127..3b43f1f2 100644 --- a/test/blocking/test_advisory_m_cna.py +++ b/test/blocking/test_advisory_m_cna.py @@ -66,7 +66,7 @@ def make_instance(self, include_optional) -> AdvisoryMCna: nodes = [ vulncheck_sdk.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', @@ -125,7 +125,7 @@ def make_instance(self, include_optional) -> AdvisoryMCna: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -165,7 +165,7 @@ def make_instance(self, include_optional) -> AdvisoryMCna: content = vulncheck_sdk.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) diff --git a/test/blocking/test_advisory_m_containers.py b/test/blocking/test_advisory_m_containers.py index 237dd7d5..47ce6161 100644 --- a/test/blocking/test_advisory_m_containers.py +++ b/test/blocking/test_advisory_m_containers.py @@ -97,7 +97,7 @@ def make_instance(self, include_optional) -> AdvisoryMContainers: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -137,7 +137,7 @@ def make_instance(self, include_optional) -> AdvisoryMContainers: content = vulncheck_sdk.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) @@ -145,7 +145,10 @@ def make_instance(self, include_optional) -> AdvisoryMContainers: problem_types = [ vulncheck_sdk.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.models.advisory/m_reference.advisory.MReference( name = '', @@ -190,7 +193,7 @@ def make_instance(self, include_optional) -> AdvisoryMContainers: nodes = [ vulncheck_sdk.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', @@ -244,7 +247,7 @@ def make_instance(self, include_optional) -> AdvisoryMContainers: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -284,7 +287,7 @@ def make_instance(self, include_optional) -> AdvisoryMContainers: content = vulncheck_sdk.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) diff --git a/test/blocking/test_advisory_m_nodes.py b/test/blocking/test_advisory_m_nodes.py index 1e3268f0..7f9fe94c 100644 --- a/test/blocking/test_advisory_m_nodes.py +++ b/test/blocking/test_advisory_m_nodes.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> AdvisoryMNodes: if include_optional: return AdvisoryMNodes( cpe_match = [ - vulncheck_sdk.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', diff --git a/test/blocking/test_advisory_malicious_package.py b/test/blocking/test_advisory_malicious_package.py index fb72b422..b5c745a2 100644 --- a/test/blocking/test_advisory_malicious_package.py +++ b/test/blocking/test_advisory_malicious_package.py @@ -44,8 +44,8 @@ def make_instance(self, include_optional) -> AdvisoryMaliciousPackage: malware = vulncheck_sdk.models.advisory/osv_obj.advisory.OSVObj( affected = [ vulncheck_sdk.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', @@ -79,7 +79,7 @@ def make_instance(self, include_optional) -> AdvisoryMaliciousPackage: modified = '', published = '', references = [ - vulncheck_sdk.models.advisory/osv_reference.advisory.OSVReference( + vulncheck_sdk.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], diff --git a/test/blocking/test_advisory_manage_engine.py b/test/blocking/test_advisory_manage_engine.py index 6cbd3845..1868c7ae 100644 --- a/test/blocking/test_advisory_manage_engine.py +++ b/test/blocking/test_advisory_manage_engine.py @@ -55,7 +55,7 @@ def make_instance(self, include_optional) -> AdvisoryManageEngine: display_value = '', ) ], product_specific_details = [ - vulncheck_sdk.models.advisory/product_specific_detail.advisory.ProductSpecificDetail( + vulncheck_sdk.models.advisory/me_product.advisory.MEProduct( id = '', display_value = '', ) ], diff --git a/test/blocking/test_advisory_manage_engine_advisory.py b/test/blocking/test_advisory_manage_engine_advisory.py index 62677917..19593b93 100644 --- a/test/blocking/test_advisory_manage_engine_advisory.py +++ b/test/blocking/test_advisory_manage_engine_advisory.py @@ -60,9 +60,7 @@ def make_instance(self, include_optional) -> AdvisoryManageEngineAdvisory: display_value = '', ) ], product_specific_details = [ - vulncheck_sdk.models.advisory/product_specific_detail.advisory.ProductSpecificDetail( - id = '', - display_value = '', ) + ], summary = '', version = '', diff --git a/test/blocking/test_advisory_mcpe_applicability.py b/test/blocking/test_advisory_mcpe_applicability.py index 156f7aa3..73b26c1c 100644 --- a/test/blocking/test_advisory_mcpe_applicability.py +++ b/test/blocking/test_advisory_mcpe_applicability.py @@ -40,7 +40,7 @@ def make_instance(self, include_optional) -> AdvisoryMCPEApplicability: nodes = [ vulncheck_sdk.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', diff --git a/test/blocking/test_advisory_meta_data.py b/test/blocking/test_advisory_meta_data.py index d9d23a4d..aabe1537 100644 --- a/test/blocking/test_advisory_meta_data.py +++ b/test/blocking/test_advisory_meta_data.py @@ -41,15 +41,13 @@ def make_instance(self, include_optional) -> AdvisoryMetaData: href = '', id = '', title = '', ), - cve = vulncheck_sdk.models.advisory/oval_cve.advisory.OvalCVE( + cve = vulncheck_sdk.models.advisory/bugzilla.advisory.Bugzilla( href = '', id = '', title = '', ), - issued = vulncheck_sdk.models.advisory/issued.advisory.Issued( - date = '', ), + issued = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), severity = '', - updated = vulncheck_sdk.models.advisory/updated.advisory.Updated( - date = '', ), ), + updated = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), ), cve = [ '' ], diff --git a/test/blocking/test_advisory_metric.py b/test/blocking/test_advisory_metric.py index e7b01d5c..ccf4be5f 100644 --- a/test/blocking/test_advisory_metric.py +++ b/test/blocking/test_advisory_metric.py @@ -59,7 +59,7 @@ def make_instance(self, include_optional) -> AdvisoryMetric: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -99,7 +99,7 @@ def make_instance(self, include_optional) -> AdvisoryMetric: content = vulncheck_sdk.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ] diff --git a/test/blocking/test_advisory_microsoft_csaf.py b/test/blocking/test_advisory_microsoft_csaf.py index f6608c24..213f0863 100644 --- a/test/blocking/test_advisory_microsoft_csaf.py +++ b/test/blocking/test_advisory_microsoft_csaf.py @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCSAF: if include_optional: return AdvisoryMicrosoftCSAF( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCSAF: text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCSAF: '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( @@ -112,7 +171,7 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCSAF: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_advisory_microsoft_cvrf.py b/test/blocking/test_advisory_microsoft_cvrf.py index ea92edd0..b591344d 100644 --- a/test/blocking/test_advisory_microsoft_cvrf.py +++ b/test/blocking/test_advisory_microsoft_cvrf.py @@ -40,7 +40,7 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCVRF: '' ], cvrf = vulncheck_sdk.models.advisory/mscvrf.advisory.MSCVRF( - document_title = vulncheck_sdk.models.advisory/ms_document_title.advisory.MSDocumentTitle( + document_title = vulncheck_sdk.models.advisory/i_val.advisory.IVal( value = '', ), document_tracking = vulncheck_sdk.models.advisory/m_document_tracking.advisory.MDocumentTracking( current_release_date = '', @@ -48,8 +48,7 @@ def make_instance(self, include_optional) -> AdvisoryMicrosoftCVRF: identification = vulncheck_sdk.models.advisory/m_identification.advisory.MIdentification( alias = vulncheck_sdk.models.advisory/i_val.advisory.IVal( value = '', ), - id = vulncheck_sdk.models.advisory/i_val.advisory.IVal( - value = '', ), ), + id = , ), revisionhistory = [ vulncheck_sdk.models.advisory/r_revision.advisory.RRevision( date = '', diff --git a/test/blocking/test_advisory_mitre_cve_list_v5.py b/test/blocking/test_advisory_mitre_cve_list_v5.py index 615e740d..d6382362 100644 --- a/test/blocking/test_advisory_mitre_cve_list_v5.py +++ b/test/blocking/test_advisory_mitre_cve_list_v5.py @@ -103,7 +103,7 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -143,7 +143,7 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5: content = vulncheck_sdk.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) @@ -151,7 +151,10 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5: problem_types = [ vulncheck_sdk.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.models.advisory/m_reference.advisory.MReference( name = '', @@ -172,7 +175,7 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5: nodes = [ vulncheck_sdk.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', @@ -192,10 +195,6 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5: type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/blocking/test_advisory_mitre_cve_list_v5_ref.py b/test/blocking/test_advisory_mitre_cve_list_v5_ref.py index 12a5d255..737aeac2 100644 --- a/test/blocking/test_advisory_mitre_cve_list_v5_ref.py +++ b/test/blocking/test_advisory_mitre_cve_list_v5_ref.py @@ -98,7 +98,7 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5Ref: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -138,7 +138,7 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5Ref: content = vulncheck_sdk.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) @@ -146,7 +146,10 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5Ref: problem_types = [ vulncheck_sdk.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.models.advisory/m_reference.advisory.MReference( name = '', @@ -167,7 +170,7 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5Ref: nodes = [ vulncheck_sdk.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', @@ -187,10 +190,6 @@ def make_instance(self, include_optional) -> AdvisoryMitreCVEListV5Ref: type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/blocking/test_advisory_mscvrf.py b/test/blocking/test_advisory_mscvrf.py index 02c42005..d46766f3 100644 --- a/test/blocking/test_advisory_mscvrf.py +++ b/test/blocking/test_advisory_mscvrf.py @@ -36,7 +36,7 @@ def make_instance(self, include_optional) -> AdvisoryMSCVRF: model = AdvisoryMSCVRF() if include_optional: return AdvisoryMSCVRF( - document_title = vulncheck_sdk.models.advisory/ms_document_title.advisory.MSDocumentTitle( + document_title = vulncheck_sdk.models.advisory/i_val.advisory.IVal( value = '', ), document_tracking = vulncheck_sdk.models.advisory/m_document_tracking.advisory.MDocumentTracking( current_release_date = '', diff --git a/test/blocking/test_advisory_ncsc.py b/test/blocking/test_advisory_ncsc.py index 136142e6..ab18eb0a 100644 --- a/test/blocking/test_advisory_ncsc.py +++ b/test/blocking/test_advisory_ncsc.py @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryNCSC: if include_optional: return AdvisoryNCSC( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryNCSC: text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryNCSC: '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( @@ -112,7 +171,7 @@ def make_instance(self, include_optional) -> AdvisoryNCSC: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_advisory_ncsccve.py b/test/blocking/test_advisory_ncsccve.py index 0dbf4439..bcfb3743 100644 --- a/test/blocking/test_advisory_ncsccve.py +++ b/test/blocking/test_advisory_ncsccve.py @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryNCSCCVE: if include_optional: return AdvisoryNCSCCVE( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryNCSCCVE: text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryNCSCCVE: '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( @@ -112,7 +171,7 @@ def make_instance(self, include_optional) -> AdvisoryNCSCCVE: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_advisory_nvd20_source.py b/test/blocking/test_advisory_nvd20_source.py index c9634a93..fa863e7c 100644 --- a/test/blocking/test_advisory_nvd20_source.py +++ b/test/blocking/test_advisory_nvd20_source.py @@ -46,7 +46,7 @@ def make_instance(self, include_optional) -> AdvisoryNVD20Source: source_identifiers = [ '' ], - v3_acceptance_level = vulncheck_sdk.models.advisory/v3_acceptance_level.advisory.V3AcceptanceLevel( + v3_acceptance_level = vulncheck_sdk.models.advisory/cwe_acceptance_level.advisory.CweAcceptanceLevel( description = '', last_modified = '', ) ) diff --git a/test/blocking/test_advisory_open_jdk.py b/test/blocking/test_advisory_open_jdk.py index 25b2cdb5..56f6dd14 100644 --- a/test/blocking/test_advisory_open_jdk.py +++ b/test/blocking/test_advisory_open_jdk.py @@ -41,7 +41,7 @@ def make_instance(self, include_optional) -> AdvisoryOpenJDK: ], date_added = '', openjdk_cves = [ - vulncheck_sdk.models.advisory/open_jdkcve.advisory.OpenJDKCVE( + vulncheck_sdk.models.advisory/adobe_cve.advisory.AdobeCVE( cve = '', cvss_score = '', cvss_vector = '', ) diff --git a/test/blocking/test_advisory_oracle_cpucsaf.py b/test/blocking/test_advisory_oracle_cpucsaf.py index 003badce..fdbab24c 100644 --- a/test/blocking/test_advisory_oracle_cpucsaf.py +++ b/test/blocking/test_advisory_oracle_cpucsaf.py @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryOracleCPUCSAF: if include_optional: return AdvisoryOracleCPUCSAF( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryOracleCPUCSAF: text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryOracleCPUCSAF: '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( @@ -112,7 +171,7 @@ def make_instance(self, include_optional) -> AdvisoryOracleCPUCSAF: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_advisory_original_ghsa.py b/test/blocking/test_advisory_original_ghsa.py index bf62d628..aa4efb25 100644 --- a/test/blocking/test_advisory_original_ghsa.py +++ b/test/blocking/test_advisory_original_ghsa.py @@ -42,13 +42,13 @@ def make_instance(self, include_optional) -> AdvisoryOriginalGHSA: affected_functions = [ '' ], ), - package = vulncheck_sdk.models.advisory/ghsa_package.advisory.GHSAPackage( + package = vulncheck_sdk.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), ranges = [ vulncheck_sdk.models.advisory/ghsa_range.advisory.GHSARange( events = [ - vulncheck_sdk.models.advisory/ghsa_event.advisory.GHSAEvent( + vulncheck_sdk.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], @@ -71,13 +71,13 @@ def make_instance(self, include_optional) -> AdvisoryOriginalGHSA: modified = '', published = '', references = [ - vulncheck_sdk.models.advisory/ghsa_reference.advisory.GHSAReference( + vulncheck_sdk.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], schema_version = '', severity = [ - vulncheck_sdk.models.advisory/ghsa_severity.advisory.GHSASeverity( + vulncheck_sdk.models.advisory/severity.advisory.Severity( score = '', type = '', ) ], diff --git a/test/blocking/test_advisory_osv.py b/test/blocking/test_advisory_osv.py index d2c70114..08e5ba31 100644 --- a/test/blocking/test_advisory_osv.py +++ b/test/blocking/test_advisory_osv.py @@ -44,8 +44,8 @@ def make_instance(self, include_optional) -> AdvisoryOSV: osv = vulncheck_sdk.models.advisory/osv_obj.advisory.OSVObj( affected = [ vulncheck_sdk.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', @@ -79,7 +79,7 @@ def make_instance(self, include_optional) -> AdvisoryOSV: modified = '', published = '', references = [ - vulncheck_sdk.models.advisory/osv_reference.advisory.OSVReference( + vulncheck_sdk.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], diff --git a/test/blocking/test_advisory_osv_obj.py b/test/blocking/test_advisory_osv_obj.py index e6fc0d12..95e87805 100644 --- a/test/blocking/test_advisory_osv_obj.py +++ b/test/blocking/test_advisory_osv_obj.py @@ -38,8 +38,8 @@ def make_instance(self, include_optional) -> AdvisoryOSVObj: return AdvisoryOSVObj( affected = [ vulncheck_sdk.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', @@ -73,7 +73,7 @@ def make_instance(self, include_optional) -> AdvisoryOSVObj: modified = '', published = '', references = [ - vulncheck_sdk.models.advisory/osv_reference.advisory.OSVReference( + vulncheck_sdk.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], diff --git a/test/blocking/test_advisory_product.py b/test/blocking/test_advisory_product.py index 4c261b75..6d3e2e98 100644 --- a/test/blocking/test_advisory_product.py +++ b/test/blocking/test_advisory_product.py @@ -38,7 +38,9 @@ def make_instance(self, include_optional) -> AdvisoryProduct: return AdvisoryProduct( name = '', product_id = '', - product_identification_helper = { } + product_identification_helper = { + 'key' : null + } ) else: return AdvisoryProduct( diff --git a/test/blocking/test_advisory_product_branch.py b/test/blocking/test_advisory_product_branch.py index f397acd5..c0e673aa 100644 --- a/test/blocking/test_advisory_product_branch.py +++ b/test/blocking/test_advisory_product_branch.py @@ -43,14 +43,18 @@ def make_instance(self, include_optional) -> AdvisoryProductBranch: product = vulncheck_sdk.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), relationships = [ vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( category = '', full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), product_reference = '', relates_to_product_reference = '', ) ], ) @@ -60,14 +64,18 @@ def make_instance(self, include_optional) -> AdvisoryProductBranch: product = vulncheck_sdk.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), relationships = [ vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( category = '', full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( name = '', product_id = '', - product_identification_helper = { }, ), + product_identification_helper = { + 'key' : null + }, ), product_reference = '', relates_to_product_reference = '', ) ] diff --git a/test/blocking/test_advisory_product_tree.py b/test/blocking/test_advisory_product_tree.py deleted file mode 100644 index ab44c577..00000000 --- a/test/blocking/test_advisory_product_tree.py +++ /dev/null @@ -1,57 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_product_tree import AdvisoryProductTree - -class TestAdvisoryProductTree(unittest.TestCase): - """AdvisoryProductTree unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryProductTree: - """Test AdvisoryProductTree - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryProductTree` - """ - model = AdvisoryProductTree() - if include_optional: - return AdvisoryProductTree( - relationships = [ - vulncheck_sdk.models.advisory/relationship.advisory.Relationship( - product_reference = '', - relates_to_product_reference = '', - relation_type = '', ) - ] - ) - else: - return AdvisoryProductTree( - ) - """ - - def testAdvisoryProductTree(self): - """Test AdvisoryProductTree""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_py_pa_advisory.py b/test/blocking/test_advisory_py_pa_advisory.py index 5625c2ce..42205f03 100644 --- a/test/blocking/test_advisory_py_pa_advisory.py +++ b/test/blocking/test_advisory_py_pa_advisory.py @@ -39,14 +39,14 @@ def make_instance(self, include_optional) -> AdvisoryPyPAAdvisory: advisory_id = '', affected = [ vulncheck_sdk.models.advisory/py_pa_affected.advisory.PyPAAffected( - package = vulncheck_sdk.models.advisory/py_pa_package.advisory.PyPAPackage( + package = vulncheck_sdk.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', purl = '', ), ranges = [ vulncheck_sdk.models.advisory/py_pa_range.advisory.PyPARange( events = [ - vulncheck_sdk.models.advisory/py_pa_event.advisory.PyPAEvent( + vulncheck_sdk.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/blocking/test_advisory_py_pa_affected.py b/test/blocking/test_advisory_py_pa_affected.py index a8a8a734..19122439 100644 --- a/test/blocking/test_advisory_py_pa_affected.py +++ b/test/blocking/test_advisory_py_pa_affected.py @@ -36,14 +36,14 @@ def make_instance(self, include_optional) -> AdvisoryPyPAAffected: model = AdvisoryPyPAAffected() if include_optional: return AdvisoryPyPAAffected( - package = vulncheck_sdk.models.advisory/py_pa_package.advisory.PyPAPackage( + package = vulncheck_sdk.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', purl = '', ), ranges = [ vulncheck_sdk.models.advisory/py_pa_range.advisory.PyPARange( events = [ - vulncheck_sdk.models.advisory/py_pa_event.advisory.PyPAEvent( + vulncheck_sdk.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/blocking/test_advisory_py_pa_range.py b/test/blocking/test_advisory_py_pa_range.py index 15680bfc..059da0ab 100644 --- a/test/blocking/test_advisory_py_pa_range.py +++ b/test/blocking/test_advisory_py_pa_range.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> AdvisoryPyPARange: if include_optional: return AdvisoryPyPARange( events = [ - vulncheck_sdk.models.advisory/py_pa_event.advisory.PyPAEvent( + vulncheck_sdk.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/blocking/test_advisory_ransomware_exploit.py b/test/blocking/test_advisory_ransomware_exploit.py index dea6cf3e..ff343254 100644 --- a/test/blocking/test_advisory_ransomware_exploit.py +++ b/test/blocking/test_advisory_ransomware_exploit.py @@ -96,7 +96,7 @@ def make_instance(self, include_optional) -> AdvisoryRansomwareExploit: vulncheck_sdk.models.advisory/tool.advisory.Tool( name = '', references = [ - vulncheck_sdk.models.advisory/tool_ref.advisory.ToolRef( + vulncheck_sdk.models.advisory/mitre_attack_ref.advisory.MitreAttackRef( date_added = '', url = '', ) ], ) diff --git a/test/blocking/test_advisory_relationship.py b/test/blocking/test_advisory_relationship.py deleted file mode 100644 index cef988d1..00000000 --- a/test/blocking/test_advisory_relationship.py +++ /dev/null @@ -1,54 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_relationship import AdvisoryRelationship - -class TestAdvisoryRelationship(unittest.TestCase): - """AdvisoryRelationship unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryRelationship: - """Test AdvisoryRelationship - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryRelationship` - """ - model = AdvisoryRelationship() - if include_optional: - return AdvisoryRelationship( - product_reference = '', - relates_to_product_reference = '', - relation_type = '' - ) - else: - return AdvisoryRelationship( - ) - """ - - def testAdvisoryRelationship(self): - """Test AdvisoryRelationship""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_revision.py b/test/blocking/test_advisory_revision.py deleted file mode 100644 index 52950d96..00000000 --- a/test/blocking/test_advisory_revision.py +++ /dev/null @@ -1,54 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_revision import AdvisoryRevision - -class TestAdvisoryRevision(unittest.TestCase): - """AdvisoryRevision unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryRevision: - """Test AdvisoryRevision - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryRevision` - """ - model = AdvisoryRevision() - if include_optional: - return AdvisoryRevision( - var_date = '', - description = '', - number = '' - ) - else: - return AdvisoryRevision( - ) - """ - - def testAdvisoryRevision(self): - """Test AdvisoryRevision""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_rhel_cve.py b/test/blocking/test_advisory_rhel_cve.py index 1538c70f..f678661a 100644 --- a/test/blocking/test_advisory_rhel_cve.py +++ b/test/blocking/test_advisory_rhel_cve.py @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryRhelCVE: if include_optional: return AdvisoryRhelCVE( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryRhelCVE: text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryRhelCVE: '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( @@ -112,7 +171,7 @@ def make_instance(self, include_optional) -> AdvisoryRhelCVE: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_advisory_roche.py b/test/blocking/test_advisory_roche.py index 1243a955..5c8416b8 100644 --- a/test/blocking/test_advisory_roche.py +++ b/test/blocking/test_advisory_roche.py @@ -41,7 +41,7 @@ def make_instance(self, include_optional) -> AdvisoryRoche: ], date_added = '', roche_cves = [ - vulncheck_sdk.models.advisory/roche_cve.advisory.RocheCVE( + vulncheck_sdk.models.advisory/adobe_cve.advisory.AdobeCVE( cve = '', cvss_score = '', cvss_vector = '', ) diff --git a/test/blocking/test_advisory_score_set.py b/test/blocking/test_advisory_score_set.py deleted file mode 100644 index cd983bb1..00000000 --- a/test/blocking/test_advisory_score_set.py +++ /dev/null @@ -1,53 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_score_set import AdvisoryScoreSet - -class TestAdvisoryScoreSet(unittest.TestCase): - """AdvisoryScoreSet unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryScoreSet: - """Test AdvisoryScoreSet - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryScoreSet` - """ - model = AdvisoryScoreSet() - if include_optional: - return AdvisoryScoreSet( - base_score = '', - vector = '' - ) - else: - return AdvisoryScoreSet( - ) - """ - - def testAdvisoryScoreSet(self): - """Test AdvisoryScoreSet""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_siemens_advisory.py b/test/blocking/test_advisory_siemens_advisory.py index dadef267..8a71751a 100644 --- a/test/blocking/test_advisory_siemens_advisory.py +++ b/test/blocking/test_advisory_siemens_advisory.py @@ -77,7 +77,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensAdvisory: name = '', namespace = '', ), references = [ - vulncheck_sdk.models.advisory/siemens_references.advisory.SiemensReferences( + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( category = '', summary = '', url = '', ) @@ -86,7 +86,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensAdvisory: tracking = vulncheck_sdk.models.advisory/siemens_tracking.advisory.SiemensTracking( current_release_date = '', generator = vulncheck_sdk.models.advisory/siemens_generator.advisory.SiemensGenerator( - engine = vulncheck_sdk.models.advisory/siemens_engine.advisory.SiemensEngine( + engine = vulncheck_sdk.models.advisory/vulnerable_product.advisory.VulnerableProduct( name = '', version = '', ), ), id = '', @@ -109,7 +109,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensAdvisory: vulnerabilities = [ vulncheck_sdk.models.advisory/siemens_vulnerability.advisory.SiemensVulnerability( cve = '', - cwe = vulncheck_sdk.models.advisory/siemens_cwe.advisory.SiemensCWE( + cwe = vulncheck_sdk.models.advisory/cwe.advisory.Cwe( id = '', name = '', ), product_status = vulncheck_sdk.models.advisory/siemens_product_status.advisory.SiemensProductStatus( diff --git a/test/blocking/test_advisory_siemens_document.py b/test/blocking/test_advisory_siemens_document.py index 53c10cac..75e62153 100644 --- a/test/blocking/test_advisory_siemens_document.py +++ b/test/blocking/test_advisory_siemens_document.py @@ -62,7 +62,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensDocument: name = '', namespace = '', ), references = [ - vulncheck_sdk.models.advisory/siemens_references.advisory.SiemensReferences( + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( category = '', summary = '', url = '', ) @@ -71,7 +71,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensDocument: tracking = vulncheck_sdk.models.advisory/siemens_tracking.advisory.SiemensTracking( current_release_date = '', generator = vulncheck_sdk.models.advisory/siemens_generator.advisory.SiemensGenerator( - engine = vulncheck_sdk.models.advisory/siemens_engine.advisory.SiemensEngine( + engine = vulncheck_sdk.models.advisory/vulnerable_product.advisory.VulnerableProduct( name = '', version = '', ), ), id = '', diff --git a/test/blocking/test_advisory_siemens_generator.py b/test/blocking/test_advisory_siemens_generator.py index 1bc48e88..65daffba 100644 --- a/test/blocking/test_advisory_siemens_generator.py +++ b/test/blocking/test_advisory_siemens_generator.py @@ -36,7 +36,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensGenerator: model = AdvisorySiemensGenerator() if include_optional: return AdvisorySiemensGenerator( - engine = vulncheck_sdk.models.advisory/siemens_engine.advisory.SiemensEngine( + engine = vulncheck_sdk.models.advisory/vulnerable_product.advisory.VulnerableProduct( name = '', version = '', ) ) diff --git a/test/blocking/test_advisory_siemens_tracking.py b/test/blocking/test_advisory_siemens_tracking.py index 1ba788f8..76160395 100644 --- a/test/blocking/test_advisory_siemens_tracking.py +++ b/test/blocking/test_advisory_siemens_tracking.py @@ -38,7 +38,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensTracking: return AdvisorySiemensTracking( current_release_date = '', generator = vulncheck_sdk.models.advisory/siemens_generator.advisory.SiemensGenerator( - engine = vulncheck_sdk.models.advisory/siemens_engine.advisory.SiemensEngine( + engine = vulncheck_sdk.models.advisory/vulnerable_product.advisory.VulnerableProduct( name = '', version = '', ), ), id = '', diff --git a/test/blocking/test_advisory_siemens_vulnerability.py b/test/blocking/test_advisory_siemens_vulnerability.py index 284a675e..6ab21598 100644 --- a/test/blocking/test_advisory_siemens_vulnerability.py +++ b/test/blocking/test_advisory_siemens_vulnerability.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensVulnerability: if include_optional: return AdvisorySiemensVulnerability( cve = '', - cwe = vulncheck_sdk.models.advisory/siemens_cwe.advisory.SiemensCWE( + cwe = vulncheck_sdk.models.advisory/cwe.advisory.Cwe( id = '', name = '', ), notes = [ @@ -51,7 +51,7 @@ def make_instance(self, include_optional) -> AdvisorySiemensVulnerability: '' ], ), references = [ - vulncheck_sdk.models.advisory/siemens_references.advisory.SiemensReferences( + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( category = '', summary = '', url = '', ) diff --git a/test/blocking/test_advisory_sigma_rule.py b/test/blocking/test_advisory_sigma_rule.py index 56bc2b23..e121cb52 100644 --- a/test/blocking/test_advisory_sigma_rule.py +++ b/test/blocking/test_advisory_sigma_rule.py @@ -47,7 +47,9 @@ def make_instance(self, include_optional) -> AdvisorySigmaRule: author = '', date = '', description = '', - detection = { }, + detection = { + 'key' : null + }, false_positives = [ '' ], diff --git a/test/blocking/test_advisory_sigma_rule_rule.py b/test/blocking/test_advisory_sigma_rule_rule.py index b8efe6b8..e76370e6 100644 --- a/test/blocking/test_advisory_sigma_rule_rule.py +++ b/test/blocking/test_advisory_sigma_rule_rule.py @@ -39,7 +39,9 @@ def make_instance(self, include_optional) -> AdvisorySigmaRuleRule: author = '', var_date = '', description = '', - detection = { }, + detection = { + 'key' : null + }, false_positives = [ '' ], diff --git a/test/blocking/test_advisory_ssa_source.py b/test/blocking/test_advisory_ssa_source.py index 23493840..39db49eb 100644 --- a/test/blocking/test_advisory_ssa_source.py +++ b/test/blocking/test_advisory_ssa_source.py @@ -63,7 +63,7 @@ def make_instance(self, include_optional) -> AdvisorySSASource: name = '', namespace = '', ), references = [ - vulncheck_sdk.models.advisory/siemens_references.advisory.SiemensReferences( + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( category = '', summary = '', url = '', ) @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> AdvisorySSASource: tracking = vulncheck_sdk.models.advisory/siemens_tracking.advisory.SiemensTracking( current_release_date = '', generator = vulncheck_sdk.models.advisory/siemens_generator.advisory.SiemensGenerator( - engine = vulncheck_sdk.models.advisory/siemens_engine.advisory.SiemensEngine( + engine = vulncheck_sdk.models.advisory/vulnerable_product.advisory.VulnerableProduct( name = '', version = '', ), ), id = '', @@ -95,7 +95,7 @@ def make_instance(self, include_optional) -> AdvisorySSASource: vulnerabilities = [ vulncheck_sdk.models.advisory/siemens_vulnerability.advisory.SiemensVulnerability( cve = '', - cwe = vulncheck_sdk.models.advisory/siemens_cwe.advisory.SiemensCWE( + cwe = vulncheck_sdk.models.advisory/cwe.advisory.Cwe( id = '', name = '', ), notes = [ @@ -109,7 +109,7 @@ def make_instance(self, include_optional) -> AdvisorySSASource: '' ], ), references = [ - vulncheck_sdk.models.advisory/siemens_references.advisory.SiemensReferences( + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( category = '', summary = '', url = '', ) diff --git a/test/blocking/test_advisory_status.py b/test/blocking/test_advisory_status.py deleted file mode 100644 index 2001a728..00000000 --- a/test/blocking/test_advisory_status.py +++ /dev/null @@ -1,55 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_status import AdvisoryStatus - -class TestAdvisoryStatus(unittest.TestCase): - """AdvisoryStatus unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryStatus: - """Test AdvisoryStatus - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryStatus` - """ - model = AdvisoryStatus() - if include_optional: - return AdvisoryStatus( - product_id = [ - '' - ], - type = '' - ) - else: - return AdvisoryStatus( - ) - """ - - def testAdvisoryStatus(self): - """Test AdvisoryStatus""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_threat.py b/test/blocking/test_advisory_threat.py deleted file mode 100644 index cf909aaf..00000000 --- a/test/blocking/test_advisory_threat.py +++ /dev/null @@ -1,53 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_threat import AdvisoryThreat - -class TestAdvisoryThreat(unittest.TestCase): - """AdvisoryThreat unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryThreat: - """Test AdvisoryThreat - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryThreat` - """ - model = AdvisoryThreat() - if include_optional: - return AdvisoryThreat( - severity = '', - type = '' - ) - else: - return AdvisoryThreat( - ) - """ - - def testAdvisoryThreat(self): - """Test AdvisoryThreat""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_threat_actor_with_external_objects.py b/test/blocking/test_advisory_threat_actor_with_external_objects.py index 9b54ef05..07d0b665 100644 --- a/test/blocking/test_advisory_threat_actor_with_external_objects.py +++ b/test/blocking/test_advisory_threat_actor_with_external_objects.py @@ -155,7 +155,7 @@ def make_instance(self, include_optional) -> AdvisoryThreatActorWithExternalObje vulncheck_sdk.models.advisory/tool.advisory.Tool( name = '', references = [ - vulncheck_sdk.models.advisory/tool_ref.advisory.ToolRef( + vulncheck_sdk.models.advisory/mitre_attack_ref.advisory.MitreAttackRef( date_added = '', url = '', ) ], ) diff --git a/test/blocking/test_advisory_tool.py b/test/blocking/test_advisory_tool.py index ae4fe5b2..8cefcbfd 100644 --- a/test/blocking/test_advisory_tool.py +++ b/test/blocking/test_advisory_tool.py @@ -38,7 +38,7 @@ def make_instance(self, include_optional) -> AdvisoryTool: return AdvisoryTool( name = '', references = [ - vulncheck_sdk.models.advisory/tool_ref.advisory.ToolRef( + vulncheck_sdk.models.advisory/mitre_attack_ref.advisory.MitreAttackRef( date_added = '', url = '', ) ] diff --git a/test/blocking/test_advisory_update.py b/test/blocking/test_advisory_update.py index 201b1a25..e76ddb58 100644 --- a/test/blocking/test_advisory_update.py +++ b/test/blocking/test_advisory_update.py @@ -42,8 +42,7 @@ def make_instance(self, include_optional) -> AdvisoryUpdate: date_added = '', description = '', id = '', - issued = vulncheck_sdk.models.advisory/date_time.advisory.DateTime( - date = '', ), + issued = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), os_arch = '', os_version = '', packages = [ @@ -64,8 +63,7 @@ def make_instance(self, include_optional) -> AdvisoryUpdate: severity = '', title = '', type = '', - updated = vulncheck_sdk.models.advisory/date_time.advisory.DateTime( - date = '', ) + updated = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution() ) else: return AdvisoryUpdate( diff --git a/test/blocking/test_advisory_updated.py b/test/blocking/test_advisory_updated.py deleted file mode 100644 index 7787049a..00000000 --- a/test/blocking/test_advisory_updated.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_updated import AdvisoryUpdated - -class TestAdvisoryUpdated(unittest.TestCase): - """AdvisoryUpdated unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryUpdated: - """Test AdvisoryUpdated - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryUpdated` - """ - model = AdvisoryUpdated() - if include_optional: - return AdvisoryUpdated( - var_date = '' - ) - else: - return AdvisoryUpdated( - ) - """ - - def testAdvisoryUpdated(self): - """Test AdvisoryUpdated""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_vde_advisory.py b/test/blocking/test_advisory_vde_advisory.py index 6c49316a..24ccefea 100644 --- a/test/blocking/test_advisory_vde_advisory.py +++ b/test/blocking/test_advisory_vde_advisory.py @@ -37,7 +37,43 @@ def make_instance(self, include_optional) -> AdvisoryVDEAdvisory: if include_optional: return AdvisoryVDEAdvisory( csaf_json = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -45,7 +81,36 @@ def make_instance(self, include_optional) -> AdvisoryVDEAdvisory: text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -73,12 +138,6 @@ def make_instance(self, include_optional) -> AdvisoryVDEAdvisory: '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( @@ -112,7 +171,7 @@ def make_instance(self, include_optional) -> AdvisoryVDEAdvisory: report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_advisory_vuln_check_cve_list_v5.py b/test/blocking/test_advisory_vuln_check_cve_list_v5.py index 55f34bd7..6f9d68ab 100644 --- a/test/blocking/test_advisory_vuln_check_cve_list_v5.py +++ b/test/blocking/test_advisory_vuln_check_cve_list_v5.py @@ -103,7 +103,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnCheckCVEListV5: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -143,7 +143,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnCheckCVEListV5: content = vulncheck_sdk.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) @@ -151,7 +151,10 @@ def make_instance(self, include_optional) -> AdvisoryVulnCheckCVEListV5: problem_types = [ vulncheck_sdk.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.models.advisory/m_reference.advisory.MReference( name = '', @@ -172,7 +175,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnCheckCVEListV5: nodes = [ vulncheck_sdk.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', @@ -192,10 +195,6 @@ def make_instance(self, include_optional) -> AdvisoryVulnCheckCVEListV5: type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/blocking/test_advisory_vuln_check_kev.py b/test/blocking/test_advisory_vuln_check_kev.py index b53512c2..fdcc695c 100644 --- a/test/blocking/test_advisory_vuln_check_kev.py +++ b/test/blocking/test_advisory_vuln_check_kev.py @@ -53,7 +53,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnCheckKEV: short_description = '', vendor_project = '', vulncheck_reported_exploitation = [ - vulncheck_sdk.models.advisory/reported_exploit.advisory.ReportedExploit( + vulncheck_sdk.models.advisory/mitre_attack_ref.advisory.MitreAttackRef( date_added = '', url = '', ) ], diff --git a/test/blocking/test_advisory_vulnerability.py b/test/blocking/test_advisory_vulnerability.py deleted file mode 100644 index 0f91e6f2..00000000 --- a/test/blocking/test_advisory_vulnerability.py +++ /dev/null @@ -1,83 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.advisory_vulnerability import AdvisoryVulnerability - -class TestAdvisoryVulnerability(unittest.TestCase): - """AdvisoryVulnerability unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> AdvisoryVulnerability: - """Test AdvisoryVulnerability - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `AdvisoryVulnerability` - """ - model = AdvisoryVulnerability() - if include_optional: - return AdvisoryVulnerability( - cve = '', - cvssscore_sets = vulncheck_sdk.models.advisory/score_set.advisory.ScoreSet( - base_score = '', - vector = '', ), - description = '', - packages = [ - vulncheck_sdk.models.advisory/vuln_check_package.advisory.VulnCheckPackage( - arch = '', - distro = '', - filename = '', - md5 = '', - name = '', - purl = '', - version = '', ) - ], - product_statuses = [ - vulncheck_sdk.models.advisory/status.advisory.Status( - product_id = [ - '' - ], - type = '', ) - ], - references = [ - vulncheck_sdk.models.advisory/cvrf_reference.advisory.CVRFReference( - description = '', - url = '', ) - ], - threats = [ - vulncheck_sdk.models.advisory/threat.advisory.Threat( - severity = '', - type = '', ) - ] - ) - else: - return AdvisoryVulnerability( - ) - """ - - def testAdvisoryVulnerability(self): - """Test AdvisoryVulnerability""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_advisory_vulnrichment.py b/test/blocking/test_advisory_vulnrichment.py index 6b5f7731..aedca4d4 100644 --- a/test/blocking/test_advisory_vulnrichment.py +++ b/test/blocking/test_advisory_vulnrichment.py @@ -96,7 +96,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnrichment: nodes = [ vulncheck_sdk.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', diff --git a/test/blocking/test_advisory_vulnrichment_containers.py b/test/blocking/test_advisory_vulnrichment_containers.py index efaa4c3a..c21ca0c3 100644 --- a/test/blocking/test_advisory_vulnrichment_containers.py +++ b/test/blocking/test_advisory_vulnrichment_containers.py @@ -114,7 +114,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnrichmentContainers: nodes = [ vulncheck_sdk.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', @@ -168,7 +168,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnrichmentContainers: user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -208,7 +208,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnrichmentContainers: content = vulncheck_sdk.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) diff --git a/test/blocking/test_advisory_vulnrichment_cve_ref.py b/test/blocking/test_advisory_vulnrichment_cve_ref.py index 5d7fbdf8..e7c746ac 100644 --- a/test/blocking/test_advisory_vulnrichment_cve_ref.py +++ b/test/blocking/test_advisory_vulnrichment_cve_ref.py @@ -91,7 +91,7 @@ def make_instance(self, include_optional) -> AdvisoryVulnrichmentCVERef: nodes = [ vulncheck_sdk.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', diff --git a/test/blocking/test_advisory_wolfi.py b/test/blocking/test_advisory_wolfi.py index 42b7e671..6d5f899c 100644 --- a/test/blocking/test_advisory_wolfi.py +++ b/test/blocking/test_advisory_wolfi.py @@ -45,7 +45,7 @@ def make_instance(self, include_optional) -> AdvisoryWolfi: vulncheck_sdk.models.advisory/wolfi_package.advisory.WolfiPackage( name = '', secfixes = [ - vulncheck_sdk.models.advisory/wolfi_sec_fix.advisory.WolfiSecFix( + vulncheck_sdk.models.advisory/chain_guard_sec_fix.advisory.ChainGuardSecFix( cve = [ '' ], diff --git a/test/blocking/test_advisory_wolfi_package.py b/test/blocking/test_advisory_wolfi_package.py index 43ec1e2a..5b9414df 100644 --- a/test/blocking/test_advisory_wolfi_package.py +++ b/test/blocking/test_advisory_wolfi_package.py @@ -38,7 +38,7 @@ def make_instance(self, include_optional) -> AdvisoryWolfiPackage: return AdvisoryWolfiPackage( name = '', secfixes = [ - vulncheck_sdk.models.advisory/wolfi_sec_fix.advisory.WolfiSecFix( + vulncheck_sdk.models.advisory/chain_guard_sec_fix.advisory.ChainGuardSecFix( cve = [ '' ], diff --git a/test/blocking/test_advisory_zdi.py b/test/blocking/test_advisory_zdi.py index c8b69c4b..16dc0c68 100644 --- a/test/blocking/test_advisory_zdi.py +++ b/test/blocking/test_advisory_zdi.py @@ -63,7 +63,7 @@ def make_instance(self, include_optional) -> AdvisoryZDI: vulncheck_sdk.models.advisory/zdi_response.advisory.ZDIResponse( text = '', uri = '', - vendor = vulncheck_sdk.models.advisory/zdi_response_vendor.advisory.ZDIResponseVendor( + vendor = vulncheck_sdk.models.advisory/go_credits.advisory.GoCredits( name = '', ), ) ], title = '', diff --git a/test/blocking/test_advisory_zdi_response.py b/test/blocking/test_advisory_zdi_response.py index 0d814548..0977c170 100644 --- a/test/blocking/test_advisory_zdi_response.py +++ b/test/blocking/test_advisory_zdi_response.py @@ -38,7 +38,7 @@ def make_instance(self, include_optional) -> AdvisoryZDIResponse: return AdvisoryZDIResponse( text = '', uri = '', - vendor = vulncheck_sdk.models.advisory/zdi_response_vendor.advisory.ZDIResponseVendor( + vendor = vulncheck_sdk.models.advisory/go_credits.advisory.GoCredits( name = '', ) ) else: diff --git a/test/blocking/test_api_base_metric_v3.py b/test/blocking/test_api_base_metric_v3.py index 143b2a94..c6b1640a 100644 --- a/test/blocking/test_api_base_metric_v3.py +++ b/test/blocking/test_api_base_metric_v3.py @@ -36,7 +36,7 @@ def make_instance(self, include_optional) -> ApiBaseMetricV3: model = ApiBaseMetricV3() if include_optional: return ApiBaseMetricV3( - cvss_v3 = vulncheck_sdk.models.api/cvssv3.api.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_api_cve.py b/test/blocking/test_api_cve.py index f63b310b..007eea7d 100644 --- a/test/blocking/test_api_cve.py +++ b/test/blocking/test_api_cve.py @@ -44,7 +44,7 @@ def make_instance(self, include_optional) -> ApiCVE: data_version = '', description = vulncheck_sdk.models.api/description.api.Description( description_data = [ - vulncheck_sdk.models.api/description_data.api.DescriptionData( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ), @@ -52,7 +52,7 @@ def make_instance(self, include_optional) -> ApiCVE: problemtype_data = [ vulncheck_sdk.models.api/problem_type_data.api.ProblemTypeData( description = [ - vulncheck_sdk.models.api/problem_type_description.api.ProblemTypeDescription( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) diff --git a/test/blocking/test_api_cve_extended.py b/test/blocking/test_api_cve_extended.py index 1764e92b..5d592f73 100644 --- a/test/blocking/test_api_cve_extended.py +++ b/test/blocking/test_api_cve_extended.py @@ -50,7 +50,7 @@ def make_instance(self, include_optional) -> ApiCVEExtended: data_version = '', description = vulncheck_sdk.models.api/description.api.Description( description_data = [ - vulncheck_sdk.models.api/description_data.api.DescriptionData( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ), @@ -58,7 +58,7 @@ def make_instance(self, include_optional) -> ApiCVEExtended: problemtype_data = [ vulncheck_sdk.models.api/problem_type_data_extended.api.ProblemTypeDataExtended( description = [ - vulncheck_sdk.models.api/problem_type_description_extended.api.ProblemTypeDescriptionExtended( + vulncheck_sdk.models.advisory/cwe_data.advisory.CweData( lang = '', name = '', url = '', diff --git a/test/blocking/test_api_cve_items.py b/test/blocking/test_api_cve_items.py index 187992e0..1fcdb669 100644 --- a/test/blocking/test_api_cve_items.py +++ b/test/blocking/test_api_cve_items.py @@ -81,7 +81,7 @@ def make_instance(self, include_optional) -> ApiCveItems: data_version = '', description = vulncheck_sdk.models.api/description.api.Description( description_data = [ - vulncheck_sdk.models.api/description_data.api.DescriptionData( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ), @@ -120,7 +120,7 @@ def make_instance(self, include_optional) -> ApiCveItems: severity = '', user_interaction_required = True, ), base_metric_v3 = vulncheck_sdk.models.api/base_metric_v3.api.BaseMetricV3( - cvss_v3 = vulncheck_sdk.models.api/cvssv3.api.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -135,7 +135,43 @@ def make_instance(self, include_optional) -> ApiCveItems: version = '', ), exploitability_score = 1.337, impact_score = 1.337, ), - metric_v40 = vulncheck_sdk.models.metric_v40.metricV40(), ), + metric_v40 = vulncheck_sdk.models.advisory/cvssv40.advisory.CVSSV40( + automatable = '', + recovery = '', + safety = '', + attack_complexity = '', + attack_requirements = '', + attack_vector = '', + availability_requirement = '', + base_score = 1.337, + base_severity = '', + confidentiality_requirement = '', + exploit_maturity = '', + integrity_requirement = '', + modified_attack_complexity = '', + modified_attack_requirements = '', + modified_attack_vector = '', + modified_privileges_required = '', + modified_sub_availability_impact = '', + modified_sub_confidentiality_impact = '', + modified_sub_integrity_impact = '', + modified_user_interaction = '', + modified_vuln_availability_impact = '', + modified_vuln_confidentiality_impact = '', + modified_vuln_integrity_impact = '', + privileges_required = '', + provider_urgency = '', + sub_availability_impact = '', + sub_confidentiality_impact = '', + sub_integrity_impact = '', + user_interaction = '', + value_density = '', + vector_string = '', + version = '', + vuln_availability_impact = '', + vuln_confidentiality_impact = '', + vuln_integrity_impact = '', + vulnerability_response_effort = '', ), ), last_modified_date = '', published_date = '', vc_configurations = vulncheck_sdk.models.api/configurations.api.Configurations( diff --git a/test/blocking/test_api_cve_items_extended.py b/test/blocking/test_api_cve_items_extended.py index fa438e41..ffe20de3 100644 --- a/test/blocking/test_api_cve_items_extended.py +++ b/test/blocking/test_api_cve_items_extended.py @@ -88,7 +88,7 @@ def make_instance(self, include_optional) -> ApiCveItemsExtended: data_version = '', description = vulncheck_sdk.models.api/description.api.Description( description_data = [ - vulncheck_sdk.models.api/description_data.api.DescriptionData( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ), @@ -131,7 +131,7 @@ def make_instance(self, include_optional) -> ApiCveItemsExtended: severity = '', user_interaction_required = True, ), base_metric_v3 = vulncheck_sdk.models.api/base_metric_v3.api.BaseMetricV3( - cvss_v3 = vulncheck_sdk.models.api/cvssv3.api.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -240,7 +240,7 @@ def make_instance(self, include_optional) -> ApiCveItemsExtended: ], published_date = '', related_attack_patterns = [ - vulncheck_sdk.models.api/related_attack_pattern.api.RelatedAttackPattern( + vulncheck_sdk.models.advisory/capec.advisory.Capec( capec_id = '', capec_name = '', capec_url = '', diff --git a/test/blocking/test_api_date_time.py b/test/blocking/test_api_date_time.py deleted file mode 100644 index cd16c372..00000000 --- a/test/blocking/test_api_date_time.py +++ /dev/null @@ -1,52 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -import unittest - -from vulncheck_sdk.models.api_date_time import ApiDateTime - -class TestApiDateTime(unittest.TestCase): - """ApiDateTime unit test stubs""" - - def setUp(self): - pass - - def tearDown(self): - pass - - def make_instance(self, include_optional) -> ApiDateTime: - """Test ApiDateTime - include_optional is a boolean, when False only required - params are included, when True both required and - optional params are included """ - # uncomment below to create an instance of `ApiDateTime` - """ - model = ApiDateTime() - if include_optional: - return ApiDateTime( - var_date = '' - ) - else: - return ApiDateTime( - ) - """ - - def testApiDateTime(self): - """Test ApiDateTime""" - # inst_req_only = self.make_instance(include_optional=False) - # inst_req_and_optional = self.make_instance(include_optional=True) - -if __name__ == '__main__': - unittest.main() diff --git a/test/blocking/test_api_description.py b/test/blocking/test_api_description.py index f6283bbf..cb8660f3 100644 --- a/test/blocking/test_api_description.py +++ b/test/blocking/test_api_description.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> ApiDescription: if include_optional: return ApiDescription( description_data = [ - vulncheck_sdk.models.api/description_data.api.DescriptionData( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ] diff --git a/test/blocking/test_api_exploits_changelog.py b/test/blocking/test_api_exploits_changelog.py index a7101261..820d6fd5 100644 --- a/test/blocking/test_api_exploits_changelog.py +++ b/test/blocking/test_api_exploits_changelog.py @@ -41,8 +41,8 @@ def make_instance(self, include_optional) -> ApiExploitsChangelog: change_time = '', change_type = '', field = '', - new_value = vulncheck_sdk.models.new_value.new_value(), - old_value = vulncheck_sdk.models.old_value.old_value(), ) + new_value = null, + old_value = null, ) ], cve = '' ) diff --git a/test/blocking/test_api_impact.py b/test/blocking/test_api_impact.py index f8f41ddc..ec70f549 100644 --- a/test/blocking/test_api_impact.py +++ b/test/blocking/test_api_impact.py @@ -56,7 +56,7 @@ def make_instance(self, include_optional) -> ApiImpact: severity = '', user_interaction_required = True, ), base_metric_v3 = vulncheck_sdk.models.api/base_metric_v3.api.BaseMetricV3( - cvss_v3 = vulncheck_sdk.models.api/cvssv3.api.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_api_impact_extended.py b/test/blocking/test_api_impact_extended.py index 33427978..4d516283 100644 --- a/test/blocking/test_api_impact_extended.py +++ b/test/blocking/test_api_impact_extended.py @@ -56,7 +56,7 @@ def make_instance(self, include_optional) -> ApiImpactExtended: severity = '', user_interaction_required = True, ), base_metric_v3 = vulncheck_sdk.models.api/base_metric_v3.api.BaseMetricV3( - cvss_v3 = vulncheck_sdk.models.api/cvssv3.api.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> ApiImpactExtended: exploitability_score = 1.337, impact_score = 1.337, ), corrected_base_metric_v3 = vulncheck_sdk.models.api/base_metric_v3.api.BaseMetricV3( - cvss_v3 = vulncheck_sdk.models.api/cvssv3.api.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_api_nvd20_cve.py b/test/blocking/test_api_nvd20_cve.py index 4d7dbb2a..af3727ad 100644 --- a/test/blocking/test_api_nvd20_cve.py +++ b/test/blocking/test_api_nvd20_cve.py @@ -61,7 +61,7 @@ def make_instance(self, include_optional) -> ApiNVD20CVE: operator = '', ) ], descriptions = [ - vulncheck_sdk.models.api/nvd20_description.api.NVD20Description( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], @@ -166,7 +166,7 @@ def make_instance(self, include_optional) -> ApiNVD20CVE: weaknesses = [ vulncheck_sdk.models.api/nvd20_weakness.api.NVD20Weakness( description = [ - vulncheck_sdk.models.api/nvd20_description.api.NVD20Description( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], diff --git a/test/blocking/test_api_nvd20_cve_extended.py b/test/blocking/test_api_nvd20_cve_extended.py index 7314a3c9..eab1e14c 100644 --- a/test/blocking/test_api_nvd20_cve_extended.py +++ b/test/blocking/test_api_nvd20_cve_extended.py @@ -69,7 +69,7 @@ def make_instance(self, include_optional) -> ApiNVD20CVEExtended: ], date_added = '', descriptions = [ - vulncheck_sdk.models.api/nvd20_description.api.NVD20Description( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], @@ -188,10 +188,7 @@ def make_instance(self, include_optional) -> ApiNVD20CVEExtended: ], threat_cvssv40 = vulncheck_sdk.models.api/nvd20_threat_cvssv40.api.NVD20ThreatCVSSV40( - associated_base_metric_v40 = vulncheck_sdk.models.api/nvd20_threat_associated_base_metric.api.NVD20ThreatAssociatedBaseMetric( - base_score = 1.337, - source = '', - type = '', ), + associated_base_metric_v40 = , base_threat_score = 1.337, base_threat_severity = '', exploit_maturity = '', ), @@ -251,7 +248,7 @@ def make_instance(self, include_optional) -> ApiNVD20CVEExtended: url = '', ) ], related_attack_patterns = [ - vulncheck_sdk.models.api/related_attack_pattern.api.RelatedAttackPattern( + vulncheck_sdk.models.advisory/capec.advisory.Capec( capec_id = '', capec_name = '', capec_url = '', @@ -295,7 +292,7 @@ def make_instance(self, include_optional) -> ApiNVD20CVEExtended: weaknesses = [ vulncheck_sdk.models.api/nvd20_weakness_extended.api.NVD20WeaknessExtended( description = [ - vulncheck_sdk.models.api/nvd20_weakness_desc_extended.api.NVD20WeaknessDescExtended( + vulncheck_sdk.models.advisory/cwe_data.advisory.CweData( lang = '', name = '', url = '', diff --git a/test/blocking/test_api_nvd20_metric_extended.py b/test/blocking/test_api_nvd20_metric_extended.py index c9099853..09c433bc 100644 --- a/test/blocking/test_api_nvd20_metric_extended.py +++ b/test/blocking/test_api_nvd20_metric_extended.py @@ -271,7 +271,7 @@ def make_instance(self, include_optional) -> ApiNVD20MetricExtended: version = '', ) ], threat_cvssv40 = vulncheck_sdk.models.api/nvd20_threat_cvssv40.api.NVD20ThreatCVSSV40( - associated_base_metric_v40 = vulncheck_sdk.models.api/nvd20_threat_associated_base_metric.api.NVD20ThreatAssociatedBaseMetric( + associated_base_metric_v40 = vulncheck_sdk.models.api/nvd20_temporal_associated_base_metric.api.NVD20TemporalAssociatedBaseMetric( base_score = 1.337, source = '', type = '', ), @@ -280,7 +280,7 @@ def make_instance(self, include_optional) -> ApiNVD20MetricExtended: exploit_maturity = '', ), threat_cvssv40_secondary = [ vulncheck_sdk.models.api/nvd20_threat_cvssv40.api.NVD20ThreatCVSSV40( - associated_base_metric_v40 = vulncheck_sdk.models.api/nvd20_threat_associated_base_metric.api.NVD20ThreatAssociatedBaseMetric( + associated_base_metric_v40 = vulncheck_sdk.models.api/nvd20_temporal_associated_base_metric.api.NVD20TemporalAssociatedBaseMetric( base_score = 1.337, source = '', type = '', ), diff --git a/test/blocking/test_api_nvd20_threat_cvssv40.py b/test/blocking/test_api_nvd20_threat_cvssv40.py index f80681c4..a8aeafea 100644 --- a/test/blocking/test_api_nvd20_threat_cvssv40.py +++ b/test/blocking/test_api_nvd20_threat_cvssv40.py @@ -36,7 +36,7 @@ def make_instance(self, include_optional) -> ApiNVD20ThreatCVSSV40: model = ApiNVD20ThreatCVSSV40() if include_optional: return ApiNVD20ThreatCVSSV40( - associated_base_metric_v40 = vulncheck_sdk.models.api/nvd20_threat_associated_base_metric.api.NVD20ThreatAssociatedBaseMetric( + associated_base_metric_v40 = vulncheck_sdk.models.api/nvd20_temporal_associated_base_metric.api.NVD20TemporalAssociatedBaseMetric( base_score = 1.337, source = '', type = '', ), diff --git a/test/blocking/test_api_nvd20_weakness.py b/test/blocking/test_api_nvd20_weakness.py index 018210d2..b41ab9ec 100644 --- a/test/blocking/test_api_nvd20_weakness.py +++ b/test/blocking/test_api_nvd20_weakness.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> ApiNVD20Weakness: if include_optional: return ApiNVD20Weakness( description = [ - vulncheck_sdk.models.api/nvd20_description.api.NVD20Description( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], diff --git a/test/blocking/test_api_nvd20_weakness_extended.py b/test/blocking/test_api_nvd20_weakness_extended.py index e8e2ef86..0d4ea082 100644 --- a/test/blocking/test_api_nvd20_weakness_extended.py +++ b/test/blocking/test_api_nvd20_weakness_extended.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> ApiNVD20WeaknessExtended: if include_optional: return ApiNVD20WeaknessExtended( description = [ - vulncheck_sdk.models.api/nvd20_weakness_desc_extended.api.NVD20WeaknessDescExtended( + vulncheck_sdk.models.advisory/cwe_data.advisory.CweData( lang = '', name = '', url = '', diff --git a/test/blocking/test_api_problem_type.py b/test/blocking/test_api_problem_type.py index 75eaa771..2644d440 100644 --- a/test/blocking/test_api_problem_type.py +++ b/test/blocking/test_api_problem_type.py @@ -39,7 +39,7 @@ def make_instance(self, include_optional) -> ApiProblemType: problemtype_data = [ vulncheck_sdk.models.api/problem_type_data.api.ProblemTypeData( description = [ - vulncheck_sdk.models.api/problem_type_description.api.ProblemTypeDescription( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) diff --git a/test/blocking/test_api_problem_type_data.py b/test/blocking/test_api_problem_type_data.py index bb088c38..8d58b1fc 100644 --- a/test/blocking/test_api_problem_type_data.py +++ b/test/blocking/test_api_problem_type_data.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> ApiProblemTypeData: if include_optional: return ApiProblemTypeData( description = [ - vulncheck_sdk.models.api/problem_type_description.api.ProblemTypeDescription( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ] diff --git a/test/blocking/test_api_problem_type_data_extended.py b/test/blocking/test_api_problem_type_data_extended.py index 280fad4e..3f8453ea 100644 --- a/test/blocking/test_api_problem_type_data_extended.py +++ b/test/blocking/test_api_problem_type_data_extended.py @@ -37,7 +37,7 @@ def make_instance(self, include_optional) -> ApiProblemTypeDataExtended: if include_optional: return ApiProblemTypeDataExtended( description = [ - vulncheck_sdk.models.api/problem_type_description_extended.api.ProblemTypeDescriptionExtended( + vulncheck_sdk.models.advisory/cwe_data.advisory.CweData( lang = '', name = '', url = '', diff --git a/test/blocking/test_api_problem_type_extended.py b/test/blocking/test_api_problem_type_extended.py index c7ed52e1..b70ce942 100644 --- a/test/blocking/test_api_problem_type_extended.py +++ b/test/blocking/test_api_problem_type_extended.py @@ -39,7 +39,7 @@ def make_instance(self, include_optional) -> ApiProblemTypeExtended: problemtype_data = [ vulncheck_sdk.models.api/problem_type_data_extended.api.ProblemTypeDataExtended( description = [ - vulncheck_sdk.models.api/problem_type_description_extended.api.ProblemTypeDescriptionExtended( + vulncheck_sdk.models.advisory/cwe_data.advisory.CweData( lang = '', name = '', url = '', diff --git a/test/blocking/test_api_update.py b/test/blocking/test_api_update.py index 1d42b02f..2f133058 100644 --- a/test/blocking/test_api_update.py +++ b/test/blocking/test_api_update.py @@ -42,12 +42,11 @@ def make_instance(self, include_optional) -> ApiUpdate: date_added = '', description = '', id = '', - issued = vulncheck_sdk.models.api/date_time.api.DateTime( - date = '', ), + issued = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), os_arch = '', os_version = '', packages = [ - vulncheck_sdk.models.api/package.api.Package( + vulncheck_sdk.models.advisory/package.advisory.Package( filename = '', name = '', release = '', @@ -55,7 +54,7 @@ def make_instance(self, include_optional) -> ApiUpdate: version = '', ) ], references = [ - vulncheck_sdk.models.api/reference.api.Reference( + vulncheck_sdk.models.advisory/reference.advisory.Reference( href = '', id = '', title = '', @@ -64,8 +63,7 @@ def make_instance(self, include_optional) -> ApiUpdate: severity = '', title = '', type = '', - updated = vulncheck_sdk.models.api/date_time.api.DateTime( - date = '', ) + updated = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution() ) else: return ApiUpdate( diff --git a/test/blocking/test_purls_purl_response.py b/test/blocking/test_purls_purl_response.py index d55e3bf4..50b23c72 100644 --- a/test/blocking/test_purls_purl_response.py +++ b/test/blocking/test_purls_purl_response.py @@ -36,7 +36,7 @@ def make_instance(self, include_optional) -> PurlsPurlResponse: model = PurlsPurlResponse() if include_optional: return PurlsPurlResponse( - artifacts = None, + artifacts = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), cves = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_abbott_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_abbott_paginate_pagination.py index 91b700f4..ff660e2c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_abbott_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_abbott_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/abbott.advisory.Abbott( + vulncheck_sdk.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_absolute_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_absolute_paginate_pagination.py index 90f8d346..a9f58c82 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_absolute_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_absolute_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/absolute.advisory.Absolute( + vulncheck_sdk.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py index 04a63c48..f5e756cd 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_adobe_advisory_paginate_pagination.py @@ -92,7 +92,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi date_added = '', link = '', solutions = [ - vulncheck_sdk.models.advisory/adobe_solution.advisory.AdobeSolution( + vulncheck_sdk.models.advisory/adobe_affected.advisory.AdobeAffected( platform = '', product = '', version = '', ) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py index 0bcdf566..8dcc29bd 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_arrow_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/apache_arrow.advisory.ApacheArrow( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py index 4ac68b70..fa200e81 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_couch_db_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/apache_couch_db.advisory.ApacheCouchDB( + vulncheck_sdk.models.advisory/apache_archiva.advisory.ApacheArchiva( affected = '', cve = [ '' diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py index 44127304..d36b0365 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_guacamole_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/apache_guacamole.advisory.ApacheGuacamole( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py index 62df9ef8..d74adad6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_jsp_wiki_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/apache_jsp_wiki.advisory.ApacheJSPWiki( + vulncheck_sdk.models.advisory/apache_archiva.advisory.ApacheArchiva( affected = '', cve = [ '' diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py index 3a7c2b20..84a7b74d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_kafka_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/apache_kafka.advisory.ApacheKafka( + vulncheck_sdk.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py index 0727bb55..e78702bf 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_of_biz_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/apache_of_biz.advisory.ApacheOFBiz( + vulncheck_sdk.models.advisory/apache_flink.advisory.ApacheFlink( affected = '', cve = [ '' diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py index f735b8fb..f5ba3ea5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_open_meetings_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/apache_open_meetings.advisory.ApacheOpenMeetings( + vulncheck_sdk.models.advisory/apache_archiva.advisory.ApacheArchiva( affected = '', cve = [ '' diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py index 459813a8..740b500b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_open_office_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/apache_open_office.advisory.ApacheOpenOffice( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py index 422332a2..3216d3ff 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_spark_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/apache_spark.advisory.ApacheSpark( + vulncheck_sdk.models.advisory/apache_archiva.advisory.ApacheArchiva( affected = '', cve = [ '' diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py index d2f06aa9..ca38ab74 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_tomcat_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/apache_tomcat.advisory.ApacheTomcat( + vulncheck_sdk.models.advisory/apache_http.advisory.ApacheHTTP( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py index 0d71b507..ec9f0b23 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_apache_zoo_keeper_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/apache_zoo_keeper.advisory.ApacheZooKeeper( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_app_check_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_app_check_paginate_pagination.py index 7e036dfc..fc2e5479 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_app_check_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_app_check_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/app_check.advisory.AppCheck( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py index ae091eae..e1b83c8e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_asset_note_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/asset_note.advisory.AssetNote( + vulncheck_sdk.models.advisory/apache_commons.advisory.ApacheCommons( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py index 3595f1bd..2075be32 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_audiocodes_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/audiocodes.advisory.Audiocodes( + vulncheck_sdk.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py index 71c63e24..2e92f7b1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_avigilon_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/avigilon.advisory.Avigilon( + vulncheck_sdk.models.advisory/autodesk.advisory.Autodesk( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_axis_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_axis_paginate_pagination.py index ecb946ed..e18f8f3d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_axis_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_axis_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/axis.advisory.Axis( + vulncheck_sdk.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py index be143317..fd31d951 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_bdu_advisory_paginate_pagination.py @@ -81,7 +81,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vector = vulncheck_sdk.models.advisory/bdu_vector.advisory.BDUVector( score = '', text = '', ), ), - cvss3 = vulncheck_sdk.models.advisory/bdu_cvss3.advisory.BDUCvss3(), + cvss3 = vulncheck_sdk.models.advisory/bdu_cvss.advisory.BDUCvss(), cwe = '', date_added = '', description_ru = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py index 934d235b..3878e3f3 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_beckman_coulter_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/beckman_coulter.advisory.BeckmanCoulter( + vulncheck_sdk.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py index 7ab3d00a..387d6277 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_beyond_trust_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/beyond_trust.advisory.BeyondTrust( + vulncheck_sdk.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py index 1ec929a0..ec40b9d2 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cert_in_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/cert_in.advisory.CertIN( + vulncheck_sdk.models.advisory/binarly.advisory.Binarly( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py index 5a9535a0..c422471a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cisa_csaf_adv_paginate_pagination.py @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.models.advisory/cisa_csaf_adv.advisory.CisaCsafAdv( csaf_json = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( @@ -149,7 +211,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py index 5e66a3ea..dd91a1d2 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cisco_csaf_paginate_pagination.py @@ -73,7 +73,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi ], ), data = [ vulncheck_sdk.models.advisory/cisco_csaf.advisory.CiscoCSAF( - csaf = vulncheck_sdk.models.csaf.csaf(), + csaf = null, cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py index 8693520e..1787f022 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cloud_bees_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/cloud_bees.advisory.CloudBees( + vulncheck_sdk.models.advisory/autodesk.advisory.Autodesk( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py index e6582911..014e8999 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_cvrf_paginate_pagination.py @@ -75,66 +75,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vulncheck_sdk.models.advisory/cvrf.advisory.Cvrf( cve = [ '' - ], - notes = [ - vulncheck_sdk.models.advisory/document_note.advisory.DocumentNote( - text = '', - title = '', - type = '', ) - ], - product_tree = vulncheck_sdk.models.advisory/product_tree.advisory.ProductTree( - relationships = [ - vulncheck_sdk.models.advisory/relationship.advisory.Relationship( - product_reference = '', - relates_to_product_reference = '', - relation_type = '', ) - ], ), - references = [ - vulncheck_sdk.models.advisory/cvrf_reference.advisory.CVRFReference( - description = '', - url = '', ) - ], - title = '', - tracking = vulncheck_sdk.models.advisory/document_tracking.advisory.DocumentTracking( - current_release_date = '', - id = '', - initial_release_date = '', - revision_history = [ - vulncheck_sdk.models.advisory/revision.advisory.Revision( - date = '', - description = '', - number = '', ) - ], - status = '', - version = '', ), - vulnerabilities = [ - vulncheck_sdk.models.advisory/vulnerability.advisory.Vulnerability( - cvssscore_sets = vulncheck_sdk.models.advisory/score_set.advisory.ScoreSet( - base_score = '', - vector = '', ), - description = '', - packages = [ - vulncheck_sdk.models.advisory/vuln_check_package.advisory.VulnCheckPackage( - arch = '', - distro = '', - filename = '', - md5 = '', - name = '', - purl = '', - version = '', ) - ], - product_statuses = [ - vulncheck_sdk.models.advisory/status.advisory.Status( - product_id = [ - '' - ], - type = '', ) - ], - threats = [ - vulncheck_sdk.models.advisory/threat.advisory.Threat( - severity = '', - type = '', ) - ], ) ], ) ] ) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_d_link_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_d_link_paginate_pagination.py index 2388d6be..2a640817 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_d_link_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_d_link_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/d_link.advisory.DLink( + vulncheck_sdk.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_dahua_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_dahua_paginate_pagination.py index 27596db3..c4cc47c4 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_dahua_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_dahua_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/dahua.advisory.Dahua( + vulncheck_sdk.models.advisory/autodesk.advisory.Autodesk( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py index c8f93f8f..c7782b4d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_debian_security_advisory_paginate_pagination.py @@ -74,7 +74,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.models.advisory/debian_security_advisory.advisory.DebianSecurityAdvisory( affected_packages = [ - vulncheck_sdk.models.advisory/affected_debian_package.advisory.AffectedDebianPackage( + vulncheck_sdk.models.advisory/vulnerable_product.advisory.VulnerableProduct( name = '', version = '', ) ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_dell_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_dell_paginate_pagination.py index 692f7db3..7a59da82 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_dell_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_dell_paginate_pagination.py @@ -80,7 +80,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi ], date_added = '', dell_cves = [ - vulncheck_sdk.models.advisory/dell_cve.advisory.DellCVE( + vulncheck_sdk.models.advisory/adobe_cve.advisory.AdobeCVE( cvss_score = '', cvss_vector = '', ) ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_dnn_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_dnn_paginate_pagination.py index f4d21982..1f7c8ad5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_dnn_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_dnn_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/dnn.advisory.DNN( + vulncheck_sdk.models.advisory/apache_hadoop.advisory.ApacheHadoop( affected = '', cve = [ '' diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_draytek_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_draytek_paginate_pagination.py index bf6b0b11..b8357a2b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_draytek_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_draytek_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/draytek.advisory.Draytek( + vulncheck_sdk.models.advisory/django.advisory.Django( affected = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py index d4a7c18a..21762a65 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_end_of_life_paginate_pagination.py @@ -80,16 +80,16 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vulncheck_sdk.models.advisory/cycle.advisory.Cycle( codename = '', cycle = '', - discontinued = vulncheck_sdk.models.discontinued.discontinued(), - eol = vulncheck_sdk.models.eol.eol(), - extended_support = vulncheck_sdk.models.extended_support.extendedSupport(), + discontinued = null, + eol = null, + extended_support = null, latest = '', latest_release_date = '', link = '', - lts = vulncheck_sdk.models.lts.lts(), + lts = null, release_date = '', release_label = '', - support = vulncheck_sdk.models.support.support(), ) + support = null, ) ], date_added = '', name = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_f5_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_f5_paginate_pagination.py index fba7ca92..b57f5dc6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_f5_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_f5_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/f5.advisory.F5( + vulncheck_sdk.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py index 33cb44be..6c92ae67 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_f_secure_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/f_secure.advisory.FSecure( + vulncheck_sdk.models.advisory/apache_archiva.advisory.ApacheArchiva( affected = '', cve = [ '' diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_fastly_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_fastly_paginate_pagination.py index a2a47d1b..75da4c17 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_fastly_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_fastly_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/fastly.advisory.Fastly( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py index 944b574f..b7b1cab6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_file_zilla_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/file_zilla.advisory.FileZilla( + vulncheck_sdk.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py index 727b24e8..ba61bd73 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_flatt_security_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/flatt_security.advisory.FlattSecurity( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_gcp_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_gcp_paginate_pagination.py index c2b276ff..d4e786c5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_gcp_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_gcp_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/gcp.advisory.GCP( + vulncheck_sdk.models.advisory/asterisk.advisory.Asterisk( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py index cd8dacfc..29acd9f9 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ge_gas_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/ge_gas.advisory.GEGas( + vulncheck_sdk.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_genetec_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_genetec_paginate_pagination.py index 63a0d26f..c3d837e4 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_genetec_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_genetec_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/genetec.advisory.Genetec( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py index 9c2700e6..4015f8b1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_gh_advisory_json_lean_paginate_pagination.py @@ -82,13 +82,8 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vector_string = '', ), cwes = vulncheck_sdk.models.advisory/cwes.advisory.Cwes( nodes = [ - vulncheck_sdk.models.advisory/cwe_node.advisory.CWENode( - cweid = '', - description = '', - id = '', - name = '', ) - ], - total_count = 56, ), + vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution() + ], ), database_id = 56, date_added = '', description = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py index e7c6dfd2..fb277b58 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ghsa_paginate_pagination.py @@ -84,13 +84,13 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi affected_functions = [ '' ], ), - package = vulncheck_sdk.models.advisory/ghsa_package.advisory.GHSAPackage( + package = vulncheck_sdk.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), ranges = [ vulncheck_sdk.models.advisory/ghsa_range.advisory.GHSARange( events = [ - vulncheck_sdk.models.advisory/ghsa_event.advisory.GHSAEvent( + vulncheck_sdk.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], @@ -113,13 +113,13 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi modified = '', published = '', references = [ - vulncheck_sdk.models.advisory/ghsa_reference.advisory.GHSAReference( + vulncheck_sdk.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], schema_version = '', severity = [ - vulncheck_sdk.models.advisory/ghsa_severity.advisory.GHSASeverity( + vulncheck_sdk.models.advisory/severity.advisory.Severity( score = '', type = '', ) ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py index d78b125b..a85bc1f5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_gigabyte_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/gigabyte.advisory.Gigabyte( + vulncheck_sdk.models.advisory/dragos_advisory.advisory.DragosAdvisory( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py index d022213c..87b5bb18 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_gitee_exploit_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/gitee_exploit.advisory.GiteeExploit( + vulncheck_sdk.models.advisory/git_lab_exploit.advisory.GitLabExploit( clone_https_url = '', clone_ssh_url = '', clone_ssh_url_cached = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py index 4078a8d3..b5f37f3b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_go_vuln_json_paginate_pagination.py @@ -76,7 +76,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi advisory_url = '', affected = [ vulncheck_sdk.models.advisory/go_vuln_affected.advisory.GoVulnAffected( - database_specific = vulncheck_sdk.models.advisory/go_vuln_database_specific.advisory.GoVulnDatabaseSpecific( + database_specific = vulncheck_sdk.models.advisory/gh_reference.advisory.GHReference( url = '', ), ecosystem_specific = vulncheck_sdk.models.advisory/go_vuln_ecosystem_specific.advisory.GoVulnEcosystemSpecific( imports = [ @@ -86,13 +86,13 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ) ], ), - package = vulncheck_sdk.models.advisory/go_vuln_package.advisory.GoVulnPackage( + package = vulncheck_sdk.models.advisory/android_package.advisory.AndroidPackage( ecosystem = '', name = '', ), ranges = [ vulncheck_sdk.models.advisory/go_vuln_ranges.advisory.GoVulnRanges( events = [ - vulncheck_sdk.models.advisory/go_event.advisory.GoEvent( + vulncheck_sdk.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], @@ -118,7 +118,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi modified = '', published = '', references = [ - vulncheck_sdk.models.advisory/go_vuln_reference.advisory.GoVulnReference( + vulncheck_sdk.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], ) diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py index dccb580f..4ee27ef4 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_harmony_os_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/harmony_os.advisory.HarmonyOS( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py index c95eef65..7a570463 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_haskell_sadb_advisory_paginate_pagination.py @@ -78,7 +78,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vulncheck_sdk.models.advisory/haskell_affected.advisory.HaskellAffected( affected_constraint = '', affected_versions = [ - vulncheck_sdk.models.advisory/haskell_version.advisory.HaskellVersion( + vulncheck_sdk.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py index 82d949e2..557df13b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_honeywell_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/honeywell.advisory.Honeywell( + vulncheck_sdk.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ibm_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ibm_paginate_pagination.py index d4a86ea8..c00552cd 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ibm_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ibm_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/ibm.advisory.IBM( + vulncheck_sdk.models.advisory/apache_http.advisory.ApacheHTTP( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py index e7fd2849..7e46722b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ivanti_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/ivanti.advisory.Ivanti( + vulncheck_sdk.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py index 5c3b7802..14095442 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ivanti_rss_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/ivanti_rss.advisory.IvantiRSS( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py index 4ff32867..61099b6b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_jnj_advisory_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/jnj_advisory.advisory.JNJAdvisory( + vulncheck_sdk.models.advisory/apache_http.advisory.ApacheHTTP( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py index 762ffc1f..60b29f56 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_kunbus_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/kunbus.advisory.Kunbus( + vulncheck_sdk.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_lg_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_lg_paginate_pagination.py index bfb3c7ff..864cca4a 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_lg_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_lg_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/lg.advisory.LG( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_linux_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_linux_paginate_pagination.py index 6bb623aa..4f4448d0 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_linux_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_linux_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/linux.advisory.Linux( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py index d4fd5ce1..b7594bf0 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_lol_advs_paginate_pagination.py @@ -80,7 +80,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi description = '', id = '', lol_json = { - 'key' : None + 'key' : null }, mitre_id = '', references = [ diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_m_files_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_m_files_paginate_pagination.py index 66e47285..b16f06cc 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_m_files_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_m_files_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/m_files.advisory.MFiles( + vulncheck_sdk.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py index 6020470e..8b4955fb 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_malicious_package_paginate_pagination.py @@ -81,8 +81,8 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi malware = vulncheck_sdk.models.advisory/osv_obj.advisory.OSVObj( affected = [ vulncheck_sdk.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', @@ -116,7 +116,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi modified = '', published = '', references = [ - vulncheck_sdk.models.advisory/osv_reference.advisory.OSVReference( + vulncheck_sdk.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py index d97bfde0..a2d84795 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_manage_engine_advisory_paginate_pagination.py @@ -97,9 +97,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi display_value = '', ) ], product_specific_details = [ - vulncheck_sdk.models.advisory/product_specific_detail.advisory.ProductSpecificDetail( - id = '', - display_value = '', ) + ], summary = '', version = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py index 72894e91..748025ae 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_meta_data_paginate_pagination.py @@ -78,15 +78,13 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi href = '', id = '', title = '', ), - cve = vulncheck_sdk.models.advisory/oval_cve.advisory.OvalCVE( + cve = vulncheck_sdk.models.advisory/bugzilla.advisory.Bugzilla( href = '', id = '', title = '', ), - issued = vulncheck_sdk.models.advisory/issued.advisory.Issued( - date = '', ), + issued = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), severity = '', - updated = vulncheck_sdk.models.advisory/updated.advisory.Updated( - date = '', ), ), + updated = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), ), cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py index 276536e4..cc11c32c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_csaf_paginate_pagination.py @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.models.advisory/microsoft_csaf.advisory.MicrosoftCSAF( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( @@ -149,7 +211,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py index 17ad03eb..a9886b04 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_cvrf_paginate_pagination.py @@ -77,7 +77,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], cvrf = vulncheck_sdk.models.advisory/mscvrf.advisory.MSCVRF( - document_title = vulncheck_sdk.models.advisory/ms_document_title.advisory.MSDocumentTitle( + document_title = vulncheck_sdk.models.advisory/i_val.advisory.IVal( value = '', ), document_tracking = vulncheck_sdk.models.advisory/m_document_tracking.advisory.MDocumentTracking( current_release_date = '', @@ -85,8 +85,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi identification = vulncheck_sdk.models.advisory/m_identification.advisory.MIdentification( alias = vulncheck_sdk.models.advisory/i_val.advisory.IVal( value = '', ), - id = vulncheck_sdk.models.advisory/i_val.advisory.IVal( - value = '', ), ), + id = , ), revisionhistory = [ vulncheck_sdk.models.advisory/r_revision.advisory.RRevision( date = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py index 72c7de92..fedcf40e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_microsoft_driver_block_list_paginate_pagination.py @@ -75,7 +75,13 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vulncheck_sdk.models.advisory/microsoft_driver_block_list.advisory.MicrosoftDriverBlockList( date_added = '', file_id = '', - file_metadata = vulncheck_sdk.models.file_metadata.file_metadata(), ) + file_metadata = vulncheck_sdk.models.advisory/microsoft_file_metadata.advisory.MicrosoftFileMetadata( + file_name = '', + maximum_file_version = '', + minimum_file_version = '', + product_name = '', + sha1_hash = '', + sha256_hash = '', ), ) ] ) else: diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py index 6e12e8c0..a1f880e6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_mikrotik_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/mikrotik.advisory.Mikrotik( + vulncheck_sdk.models.advisory/grafana.advisory.Grafana( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_mindray_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_mindray_paginate_pagination.py index b73b77a2..1ad2c99f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_mindray_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_mindray_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/mindray.advisory.Mindray( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_mitel_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_mitel_paginate_pagination.py index db2a504e..3b0d9cb3 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_mitel_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_mitel_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/mitel.advisory.Mitel( + vulncheck_sdk.models.advisory/asterisk.advisory.Asterisk( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py index 7e7a7a28..dfedf6b5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_mitre_cve_list_v5_paginate_pagination.py @@ -140,7 +140,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -180,7 +180,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi content = vulncheck_sdk.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) @@ -188,7 +188,10 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi problem_types = [ vulncheck_sdk.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.models.advisory/m_reference.advisory.MReference( name = '', @@ -209,7 +212,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi nodes = [ vulncheck_sdk.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', @@ -229,10 +232,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py index 57fbc5ef..e9e8d136 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_moxa_advisory_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/moxa_advisory.advisory.MoxaAdvisory( + vulncheck_sdk.models.advisory/advantech.advisory.Advantech( advisory_id = '', cve = [ '' diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_naver_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_naver_paginate_pagination.py index 1b44dfc6..6f7c4fba 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_naver_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_naver_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/naver.advisory.Naver( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py index fce6ccf0..e38e3e09 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ncsc_paginate_pagination.py @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.models.advisory/ncsc.advisory.NCSC( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( @@ -149,7 +211,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py index 5428c128..672ef676 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ncsccve_paginate_pagination.py @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.models.advisory/ncsccve.advisory.NCSCCVE( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( @@ -149,7 +211,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_netgate_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_netgate_paginate_pagination.py index 53a400f9..691750a6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_netgate_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_netgate_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/netgate.advisory.Netgate( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_nokia_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_nokia_paginate_pagination.py index a6bdb287..ea1aa917 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_nokia_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_nokia_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/nokia.advisory.Nokia( + vulncheck_sdk.models.advisory/forge_rock.advisory.ForgeRock( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py index c3b9089c..8c15bc20 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_note_pad_plus_plus_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/note_pad_plus_plus.advisory.NotePadPlusPlus( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py index dac544a9..88dda7c5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_nozomi_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/nozomi.advisory.Nozomi( + vulncheck_sdk.models.advisory/glibc.advisory.Glibc( affected = '', cve = [ '' diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py index 43701171..f4e4cb5e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_nvd20_source_paginate_pagination.py @@ -83,7 +83,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi source_identifiers = [ '' ], - v3_acceptance_level = vulncheck_sdk.models.advisory/v3_acceptance_level.advisory.V3AcceptanceLevel( + v3_acceptance_level = vulncheck_sdk.models.advisory/cwe_acceptance_level.advisory.CweAcceptanceLevel( description = '', last_modified = '', ), ) ] diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_omron_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_omron_paginate_pagination.py index 7fbf6a51..61c12f81 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_omron_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_omron_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/omron.advisory.Omron( + vulncheck_sdk.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_one_e_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_one_e_paginate_pagination.py index f8640a89..8e1a8759 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_one_e_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_one_e_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/one_e.advisory.OneE( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py index 0cc78654..92e90655 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_open_jdk_paginate_pagination.py @@ -78,7 +78,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi ], date_added = '', openjdk_cves = [ - vulncheck_sdk.models.advisory/open_jdkcve.advisory.OpenJDKCVE( + vulncheck_sdk.models.advisory/adobe_cve.advisory.AdobeCVE( cvss_score = '', cvss_vector = '', ) ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py index e7e9519e..97049231 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_open_ssh_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/open_ssh.advisory.OpenSSH( + vulncheck_sdk.models.advisory/apache_pulsar.advisory.ApachePulsar( affected = '', cve = [ '' diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_opengear_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_opengear_paginate_pagination.py index 2cff3497..ab137d96 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_opengear_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_opengear_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/opengear.advisory.Opengear( + vulncheck_sdk.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py index 943faa11..3d1f36be 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_oracle_cpucsaf_paginate_pagination.py @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.models.advisory/oracle_cpucsaf.advisory.OracleCPUCSAF( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( @@ -149,7 +211,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_osv_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_osv_paginate_pagination.py index 175730e2..a7c559ee 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_osv_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_osv_paginate_pagination.py @@ -81,8 +81,8 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi osv = vulncheck_sdk.models.advisory/osv_obj.advisory.OSVObj( affected = [ vulncheck_sdk.models.advisory/affected.advisory.Affected( - database_specific = vulncheck_sdk.models.database_specific.database_specific(), - ecosystem_specific = vulncheck_sdk.models.ecosystem_specific.ecosystem_specific(), + database_specific = null, + ecosystem_specific = null, package = vulncheck_sdk.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', @@ -116,7 +116,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi modified = '', published = '', references = [ - vulncheck_sdk.models.advisory/osv_reference.advisory.OSVReference( + vulncheck_sdk.models.advisory/android_reference.advisory.AndroidReference( type = '', url = '', ) ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py index ecf6c566..f1d9d665 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_own_cloud_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/own_cloud.advisory.OwnCloud( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py index 4b81f3a2..cb3730ff 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_panasonic_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/panasonic.advisory.Panasonic( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py index 2146ae43..bde9c0a3 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_phpmy_admin_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/phpmy_admin.advisory.PHPMyAdmin( + vulncheck_sdk.models.advisory/binarly.advisory.Binarly( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py index d865a463..a023de4d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_pk_cert_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/pk_cert.advisory.PKCert( + vulncheck_sdk.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py index 25024e0f..b19e81e1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_power_dns_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/power_dns.advisory.PowerDNS( + vulncheck_sdk.models.advisory/apache_archiva.advisory.ApacheArchiva( affected = '', cve = [ '' diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_progress_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_progress_paginate_pagination.py index d1c1a8e1..748d9da1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_progress_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_progress_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/progress.advisory.Progress( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py index 4e0ccd61..480d7594 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_proofpoint_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/proofpoint.advisory.Proofpoint( + vulncheck_sdk.models.advisory/netskope.advisory.Netskope( advisory_id = '', cve = [ '' diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ptc_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ptc_paginate_pagination.py index c8aaf317..512431a6 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ptc_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ptc_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/ptc.advisory.PTC( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py index 65852c3b..6d5263ad 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_py_pa_advisory_paginate_pagination.py @@ -76,14 +76,14 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi advisory_id = '', affected = [ vulncheck_sdk.models.advisory/py_pa_affected.advisory.PyPAAffected( - package = vulncheck_sdk.models.advisory/py_pa_package.advisory.PyPAPackage( + package = vulncheck_sdk.models.advisory/osv_package.advisory.OSVPackage( ecosystem = '', name = '', purl = '', ), ranges = [ vulncheck_sdk.models.advisory/py_pa_range.advisory.PyPARange( events = [ - vulncheck_sdk.models.advisory/py_pa_event.advisory.PyPAEvent( + vulncheck_sdk.models.advisory/android_event.advisory.AndroidEvent( fixed = '', introduced = '', ) ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_qsb_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_qsb_paginate_pagination.py index 0854c270..66aa4482 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_qsb_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_qsb_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/qsb.advisory.QSB( + vulncheck_sdk.models.advisory/binarly.advisory.Binarly( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py index 0b153e52..1e782f91 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_red_lion_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/red_lion.advisory.RedLion( + vulncheck_sdk.models.advisory/grafana.advisory.Grafana( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py index b50daf6f..21fc17a5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_renesas_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/renesas.advisory.Renesas( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py index 90ddeb72..cabdb89d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_rhel_cve_paginate_pagination.py @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.models.advisory/rhel_cve.advisory.RhelCVE( csaf = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( @@ -149,7 +211,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_roche_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_roche_paginate_pagination.py index fb105cd2..fab7648e 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_roche_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_roche_paginate_pagination.py @@ -78,7 +78,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi ], date_added = '', roche_cves = [ - vulncheck_sdk.models.advisory/roche_cve.advisory.RocheCVE( + vulncheck_sdk.models.advisory/adobe_cve.advisory.AdobeCVE( cvss_score = '', cvss_vector = '', ) ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_rsync_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_rsync_paginate_pagination.py index 9c22cc9d..40908a79 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_rsync_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_rsync_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/rsync.advisory.Rsync( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py index ac5f53ed..2f238380 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_ruckus_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/ruckus.advisory.Ruckus( + vulncheck_sdk.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_safran_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_safran_paginate_pagination.py index e1e3c08b..4f94f5e5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_safran_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_safran_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/safran.advisory.Safran( + vulncheck_sdk.models.advisory/apache_http.advisory.ApacheHTTP( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py index 83acafdf..aadf0b5f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sandisk_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/sandisk.advisory.Sandisk( + vulncheck_sdk.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py index 16b92103..4fcb8e06 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_schutzwerk_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/schutzwerk.advisory.Schutzwerk( + vulncheck_sdk.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py index b992290e..8a114526 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sec_consult_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/sec_consult.advisory.SECConsult( + vulncheck_sdk.models.advisory/apache_hadoop.advisory.ApacheHadoop( affected = '', cve = [ '' diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_service_now_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_service_now_paginate_pagination.py index d9593e15..d55c695d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_service_now_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_service_now_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/service_now.advisory.ServiceNow( + vulncheck_sdk.models.advisory/apache_commons.advisory.ApacheCommons( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py index 87b1fcb0..05cb5773 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_seven_zip_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/seven_zip.advisory.SevenZip( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_shielder_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_shielder_paginate_pagination.py index 8588e5ab..ee158400 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_shielder_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_shielder_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/shielder.advisory.Shielder( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py index 7acd37e4..166e5ff5 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_siemens_advisory_paginate_pagination.py @@ -114,7 +114,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi name = '', namespace = '', ), references = [ - vulncheck_sdk.models.advisory/siemens_references.advisory.SiemensReferences( + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( category = '', summary = '', url = '', ) @@ -123,7 +123,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi tracking = vulncheck_sdk.models.advisory/siemens_tracking.advisory.SiemensTracking( current_release_date = '', generator = vulncheck_sdk.models.advisory/siemens_generator.advisory.SiemensGenerator( - engine = vulncheck_sdk.models.advisory/siemens_engine.advisory.SiemensEngine( + engine = vulncheck_sdk.models.advisory/vulnerable_product.advisory.VulnerableProduct( name = '', version = '', ), ), id = '', @@ -145,7 +145,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/siemens_vulnerability.advisory.SiemensVulnerability( - cwe = vulncheck_sdk.models.advisory/siemens_cwe.advisory.SiemensCWE( + cwe = vulncheck_sdk.models.advisory/cwe.advisory.Cwe( id = '', name = '', ), product_status = vulncheck_sdk.models.advisory/siemens_product_status.advisory.SiemensProductStatus( diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py index 99599c95..02a53be1 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sigma_rule_paginate_pagination.py @@ -84,7 +84,9 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi author = '', date = '', description = '', - detection = { }, + detection = { + 'key' : null + }, false_positives = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_slackware_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_slackware_paginate_pagination.py index d25fd1f1..cbea359c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_slackware_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_slackware_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/slackware.advisory.Slackware( + vulncheck_sdk.models.advisory/autodesk.advisory.Autodesk( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_solr_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_solr_paginate_pagination.py index 2100a0e7..dfdf1db4 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_solr_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_solr_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/solr.advisory.Solr( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py index db21142a..fba69678 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_sonatype_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/sonatype.advisory.Sonatype( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py index a5fd00ab..0b8c3fd0 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_spacelabs_healthcare_advisory_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/spacelabs_healthcare_advisory.advisory.SpacelabsHealthcareAdvisory( + vulncheck_sdk.models.advisory/apache_http.advisory.ApacheHTTP( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py index 50a13fbe..3f6c2c7d 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_suse_security_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/suse_security.advisory.SuseSecurity( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_symfony_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_symfony_paginate_pagination.py index 49cedb10..83563325 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_symfony_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_symfony_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/symfony.advisory.Symfony( + vulncheck_sdk.models.advisory/apache_archiva.advisory.ApacheArchiva( affected = '', cve = [ '' diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py index d9f63a0b..2d7f8d63 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_synacktiv_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/synacktiv.advisory.Synacktiv( + vulncheck_sdk.models.advisory/apache_hadoop.advisory.ApacheHadoop( affected = '', cve = [ '' diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py index 2feb8fa3..519dc264 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_tailscale_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/tailscale.advisory.Tailscale( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py index e73d0350..bd386ba8 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_thermo_fisher_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/thermo_fisher.advisory.ThermoFisher( + vulncheck_sdk.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py index 26777cad..8edbd4fd 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_trustwave_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/trustwave.advisory.Trustwave( + vulncheck_sdk.models.advisory/binarly.advisory.Binarly( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_update_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_update_paginate_pagination.py index 12ed5aac..62c8a9d2 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_update_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_update_paginate_pagination.py @@ -79,8 +79,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi date_added = '', description = '', id = '', - issued = vulncheck_sdk.models.advisory/date_time.advisory.DateTime( - date = '', ), + issued = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), os_arch = '', os_version = '', packages = [ @@ -101,8 +100,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi severity = '', title = '', type = '', - updated = vulncheck_sdk.models.advisory/date_time.advisory.DateTime( - date = '', ), ) + updated = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), ) ] ) else: diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py index 20f2078c..e35960b3 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_van_dyke_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/van_dyke.advisory.VanDyke( + vulncheck_sdk.models.advisory/apache_commons.advisory.ApacheCommons( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py index e08bc98a..2dcfa8e2 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vde_advisory_paginate_pagination.py @@ -74,7 +74,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi data = [ vulncheck_sdk.models.advisory/vde_advisory.advisory.VDEAdvisory( csaf_json = vulncheck_sdk.models.advisory/csaf.advisory.CSAF( - document = vulncheck_sdk.models.document.document(), + document = vulncheck_sdk.models.advisory/document_metadata.advisory.DocumentMetadata( + category = '', + csaf_version = '', + distribution = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), + lang = '', + notes = [ + vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( + audience = '', + category = '', + text = '', + title = '', ) + ], + publisher = vulncheck_sdk.models.advisory/publisher.advisory.Publisher( + category = '', + contact_details = '', + issuing_authority = '', + name = '', + namespace = '', ), + references = [ + vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( + category = '', + summary = '', + url = '', ) + ], + title = '', + tracking = vulncheck_sdk.models.advisory/tracking.advisory.Tracking( + current_release_date = '', + id = '', + initial_release_date = '', + revision_history = [ + vulncheck_sdk.models.advisory/revision_history.advisory.RevisionHistory( + date = '', + number = '', + summary = '', ) + ], + status = '', + version = '', ), ), notes = [ vulncheck_sdk.models.advisory/csaf_note.advisory.CSAFNote( audience = '', @@ -82,7 +118,39 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi text = '', title = '', ) ], - product_tree = vulncheck_sdk.models.product_tree.product_tree(), + product_tree = vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + branches = [ + vulncheck_sdk.models.advisory/product_branch.advisory.ProductBranch( + category = '', + name = '', + product = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + full_product_name = vulncheck_sdk.models.advisory/product.advisory.Product( + name = '', + product_id = '', + product_identification_helper = { + 'key' : null + }, ), + product_reference = '', + relates_to_product_reference = '', ) + ], ) + ], + category = '', + name = '', + product = , + relationships = [ + vulncheck_sdk.models.advisory/csaf_relationship.advisory.CSAFRelationship( + category = '', + product_reference = '', + relates_to_product_reference = '', ) + ], ), vulnerabilities = [ vulncheck_sdk.models.advisory/csaf_vulnerability.advisory.CSAFVulnerability( cve = '', @@ -110,12 +178,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ] }, - references = [ - vulncheck_sdk.models.advisory/csaf_reference.advisory.CSAFReference( - category = '', - summary = '', - url = '', ) - ], release_date = '', remediations = [ vulncheck_sdk.models.advisory/remediation_data.advisory.RemediationData( @@ -149,7 +211,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi report_confidence = '', target_distribution = '', temporal_score = 1.337, ), - cvss_v3 = vulncheck_sdk.models.advisory/cvssv3.advisory.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vlc_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vlc_paginate_pagination.py index 36f0441b..2d0e99a0 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vlc_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vlc_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/vlc.advisory.VLC( + vulncheck_sdk.models.advisory/autodesk.advisory.Autodesk( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py index a11e0061..d8ffbc55 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_void_sec_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/void_sec.advisory.VoidSec( + vulncheck_sdk.models.advisory/apache_commons.advisory.ApacheCommons( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py index f967b31f..25997c3c 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_cve_list_v5_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/vuln_check_cve_list_v5.advisory.VulnCheckCVEListV5( + vulncheck_sdk.models.advisory/mitre_cve_list_v5.advisory.MitreCVEListV5( cve = [ '' ], @@ -140,7 +140,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi user_interaction = '', vector_string = '', version = '', ), - cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v31.advisory.MCvssV31( + cvss_v3_1 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -180,7 +180,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi content = vulncheck_sdk.models.content.content(), type = '', ), scenarios = [ - vulncheck_sdk.models.advisory/metric_scenario.advisory.MetricScenario( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ) @@ -188,7 +188,10 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi problem_types = [ vulncheck_sdk.models.advisory/m_problem_types.advisory.MProblemTypes() ], - provider_metadata = vulncheck_sdk.models.provider_metadata.providerMetadata(), + provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( + date_updated = '', + org_id = '', + short_name = '', ), references = [ vulncheck_sdk.models.advisory/m_reference.advisory.MReference( name = '', @@ -209,7 +212,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi nodes = [ vulncheck_sdk.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', @@ -229,10 +232,6 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi type = '', value = '', ) ], - provider_metadata = vulncheck_sdk.models.advisory/m_provider_metadata.advisory.MProviderMetadata( - date_updated = '', - org_id = '', - short_name = '', ), timeline = [ vulncheck_sdk.models.advisory/timeline.advisory.Timeline( lang = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py index c22d8e27..49a62dc2 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vuln_check_kev_paginate_pagination.py @@ -90,7 +90,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi short_description = '', vendor_project = '', vulncheck_reported_exploitation = [ - vulncheck_sdk.models.advisory/reported_exploit.advisory.ReportedExploit( + vulncheck_sdk.models.advisory/mitre_attack_ref.advisory.MitreAttackRef( date_added = '', url = '', ) ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py index 39fa0817..67db2054 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vulnrichment_paginate_pagination.py @@ -133,7 +133,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi nodes = [ vulncheck_sdk.models.advisory/m_nodes.advisory.MNodes( cpe_match = [ - vulncheck_sdk.models.advisory/mcpe_match.advisory.MCPEMatch( + vulncheck_sdk.models.advisory/nvd20_cvecpe_match.advisory.NVD20CVECPEMatch( criteria = '', match_criteria_id = '', version_end_excluding = '', diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py index d17bf6d9..5e458412 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_vyaire_advisory_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/vyaire_advisory.advisory.VYAIREAdvisory( + vulncheck_sdk.models.advisory/apache_http.advisory.ApacheHTTP( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py index 873e8fb3..405a0828 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_whats_app_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/whats_app.advisory.WhatsApp( + vulncheck_sdk.models.advisory/apache_shiro.advisory.ApacheShiro( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_wibu_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_wibu_paginate_pagination.py index 2389b278..bd05a413 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_wibu_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_wibu_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/wibu.advisory.Wibu( + vulncheck_sdk.models.advisory/autodesk.advisory.Autodesk( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py index 9d2a4431..36d3a11b 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_wireshark_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/wireshark.advisory.Wireshark( + vulncheck_sdk.models.advisory/revive.advisory.Revive( affected = '', cve = [ '' diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py index b7030295..7f5ebead 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_with_secure_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/with_secure.advisory.WithSecure( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py index cfe98f11..a8f10648 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_wolfi_paginate_pagination.py @@ -82,7 +82,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi vulncheck_sdk.models.advisory/wolfi_package.advisory.WolfiPackage( name = '', secfixes = [ - vulncheck_sdk.models.advisory/wolfi_sec_fix.advisory.WolfiSecFix( + vulncheck_sdk.models.advisory/chain_guard_sec_fix.advisory.ChainGuardSecFix( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_xerox_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_xerox_paginate_pagination.py index 1d6b0d14..c34578cd 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_xerox_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_xerox_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/xerox.advisory.Xerox( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_yubico_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_yubico_paginate_pagination.py index 205af353..7fa8db7f 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_yubico_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_yubico_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/yubico.advisory.Yubico( + vulncheck_sdk.models.advisory/appgate.advisory.Appgate( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_zebra_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_zebra_paginate_pagination.py index 0212c324..d16219dc 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_zebra_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_zebra_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/zebra.advisory.Zebra( + vulncheck_sdk.models.advisory/aws.advisory.AWS( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py index 3d7924ec..d9e72a63 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_zscaler_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/zscaler.advisory.Zscaler( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py index ac156523..1e3c0084 100644 --- a/test/blocking/test_render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_advisory_zyxel_paginate_pagination.py @@ -72,7 +72,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayAdvi '' ], ), data = [ - vulncheck_sdk.models.advisory/zyxel.advisory.Zyxel( + vulncheck_sdk.models.advisory/aleph_research.advisory.AlephResearch( cve = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py index ec17eb1f..991141f5 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_cve_items_extended_paginate_pagination.py @@ -125,7 +125,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiC data_version = '', description = vulncheck_sdk.models.api/description.api.Description( description_data = [ - vulncheck_sdk.models.api/description_data.api.DescriptionData( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ), @@ -168,7 +168,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiC severity = '', user_interaction_required = True, ), base_metric_v3 = vulncheck_sdk.models.api/base_metric_v3.api.BaseMetricV3( - cvss_v3 = vulncheck_sdk.models.api/cvssv3.api.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -276,7 +276,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiC ], published_date = '', related_attack_patterns = [ - vulncheck_sdk.models.api/related_attack_pattern.api.RelatedAttackPattern( + vulncheck_sdk.models.advisory/capec.advisory.Capec( capec_id = '', capec_name = '', capec_url = '', diff --git a/test/blocking/test_render_response_with_metadata_array_api_cve_items_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_cve_items_paginate_pagination.py index 8228f0ae..8b118d7f 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_cve_items_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_cve_items_paginate_pagination.py @@ -118,7 +118,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiC data_version = '', description = vulncheck_sdk.models.api/description.api.Description( description_data = [ - vulncheck_sdk.models.api/description_data.api.DescriptionData( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], ), @@ -157,7 +157,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiC severity = '', user_interaction_required = True, ), base_metric_v3 = vulncheck_sdk.models.api/base_metric_v3.api.BaseMetricV3( - cvss_v3 = vulncheck_sdk.models.api/cvssv3.api.CVSSV3( + cvss_v3 = vulncheck_sdk.models.advisory/m_cvss_v30.advisory.MCvssV30( attack_complexity = '', attack_vector = '', availability_impact = '', @@ -172,7 +172,43 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiC version = '', ), exploitability_score = 1.337, impact_score = 1.337, ), - metric_v40 = vulncheck_sdk.models.metric_v40.metricV40(), ), + metric_v40 = vulncheck_sdk.models.advisory/cvssv40.advisory.CVSSV40( + automatable = '', + recovery = '', + safety = '', + attack_complexity = '', + attack_requirements = '', + attack_vector = '', + availability_requirement = '', + base_score = 1.337, + base_severity = '', + confidentiality_requirement = '', + exploit_maturity = '', + integrity_requirement = '', + modified_attack_complexity = '', + modified_attack_requirements = '', + modified_attack_vector = '', + modified_privileges_required = '', + modified_sub_availability_impact = '', + modified_sub_confidentiality_impact = '', + modified_sub_integrity_impact = '', + modified_user_interaction = '', + modified_vuln_availability_impact = '', + modified_vuln_confidentiality_impact = '', + modified_vuln_integrity_impact = '', + privileges_required = '', + provider_urgency = '', + sub_availability_impact = '', + sub_confidentiality_impact = '', + sub_integrity_impact = '', + user_interaction = '', + value_density = '', + vector_string = '', + version = '', + vuln_availability_impact = '', + vuln_confidentiality_impact = '', + vuln_integrity_impact = '', + vulnerability_response_effort = '', ), ), last_modified_date = '', published_date = '', vc_configurations = vulncheck_sdk.models.api/configurations.api.Configurations( diff --git a/test/blocking/test_render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py index ce86e530..0c2c93e2 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_exploit_v3_result_paginate_pagination.py @@ -81,7 +81,10 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiE ransomware_families = 56, threat_actors = 56, ), date_added = '', - epss = vulncheck_sdk.models.epss.epss(), + epss = vulncheck_sdk.models.api/epss.api.EPSS( + epss_percentile = 1.337, + epss_score = 1.337, + last_modified = '', ), exploits = [ vulncheck_sdk.models.api/normalized_exploit_v3_entry.api.NormalizedExploitV3Entry( clone_ssh_url = '', diff --git a/test/blocking/test_render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py index e48e7cef..8fb70561 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_exploits_changelog_paginate_pagination.py @@ -78,8 +78,8 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiE change_time = '', change_type = '', field = '', - new_value = vulncheck_sdk.models.new_value.new_value(), - old_value = vulncheck_sdk.models.old_value.old_value(), ) + new_value = null, + old_value = null, ) ], cve = '', ) ] diff --git a/test/blocking/test_render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py index a0571fb4..1e5db02e 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_nvd20_cve_extended_paginate_pagination.py @@ -106,7 +106,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiN ], date_added = '', descriptions = [ - vulncheck_sdk.models.api/nvd20_description.api.NVD20Description( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], @@ -225,10 +225,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiN ], threat_cvssv40 = vulncheck_sdk.models.api/nvd20_threat_cvssv40.api.NVD20ThreatCVSSV40( - associated_base_metric_v40 = vulncheck_sdk.models.api/nvd20_threat_associated_base_metric.api.NVD20ThreatAssociatedBaseMetric( - base_score = 1.337, - source = '', - type = '', ), + associated_base_metric_v40 = , base_threat_score = 1.337, base_threat_severity = '', exploit_maturity = '', ), @@ -285,7 +282,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiN url = '', ) ], related_attack_patterns = [ - vulncheck_sdk.models.api/related_attack_pattern.api.RelatedAttackPattern( + vulncheck_sdk.models.advisory/capec.advisory.Capec( capec_id = '', capec_name = '', capec_url = '', @@ -314,7 +311,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiN weaknesses = [ vulncheck_sdk.models.api/nvd20_weakness_extended.api.NVD20WeaknessExtended( description = [ - vulncheck_sdk.models.api/nvd20_weakness_desc_extended.api.NVD20WeaknessDescExtended( + vulncheck_sdk.models.advisory/cwe_data.advisory.CweData( lang = '', name = '', url = '', diff --git a/test/blocking/test_render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py index 6d451479..6dedd974 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_nvd20_cve_paginate_pagination.py @@ -98,7 +98,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiN operator = '', ) ], descriptions = [ - vulncheck_sdk.models.api/nvd20_description.api.NVD20Description( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], @@ -188,7 +188,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiN weaknesses = [ vulncheck_sdk.models.api/nvd20_weakness.api.NVD20Weakness( description = [ - vulncheck_sdk.models.api/nvd20_description.api.NVD20Description( + vulncheck_sdk.models.advisory/m_descriptions.advisory.MDescriptions( lang = '', value = '', ) ], diff --git a/test/blocking/test_render_response_with_metadata_array_api_update_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_api_update_paginate_pagination.py index b6fc11e4..f4cf88ad 100644 --- a/test/blocking/test_render_response_with_metadata_array_api_update_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_api_update_paginate_pagination.py @@ -79,12 +79,11 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiU date_added = '', description = '', id = '', - issued = vulncheck_sdk.models.api/date_time.api.DateTime( - date = '', ), + issued = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), os_arch = '', os_version = '', packages = [ - vulncheck_sdk.models.api/package.api.Package( + vulncheck_sdk.models.advisory/package.advisory.Package( filename = '', name = '', release = '', @@ -92,7 +91,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiU version = '', ) ], references = [ - vulncheck_sdk.models.api/reference.api.Reference( + vulncheck_sdk.models.advisory/reference.advisory.Reference( href = '', id = '', title = '', @@ -101,8 +100,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayApiU severity = '', title = '', type = '', - updated = vulncheck_sdk.models.api/date_time.api.DateTime( - date = '', ), ) + updated = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), ) ] ) else: diff --git a/test/blocking/test_render_response_with_metadata_array_purls_purl_response_paginate_pagination.py b/test/blocking/test_render_response_with_metadata_array_purls_purl_response_paginate_pagination.py index f1f53ffb..1652ea1a 100644 --- a/test/blocking/test_render_response_with_metadata_array_purls_purl_response_paginate_pagination.py +++ b/test/blocking/test_render_response_with_metadata_array_purls_purl_response_paginate_pagination.py @@ -73,7 +73,7 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataArrayPurl ], ), data = [ vulncheck_sdk.models.purls/purl_response.purls.PurlResponse( - artifacts = vulncheck_sdk.models.artifacts.artifacts(), + artifacts = vulncheck_sdk.models.advisory/csaf_distribution.advisory.CSAFDistribution(), cves = [ '' ], diff --git a/test/blocking/test_render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py b/test/blocking/test_render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py index f8bd951e..35928404 100644 --- a/test/blocking/test_render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py +++ b/test/blocking/test_render_response_with_metadata_v3controllers_purl_response_data_v3controllers_purl_response_metadata.py @@ -38,7 +38,17 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataV3control return RenderResponseWithMetadataV3controllersPurlResponseDataV3controllersPurlResponseMetadata( benchmark = 1.337, meta = vulncheck_sdk.models.v3controllers/purl_response_metadata.v3controllers.PurlResponseMetadata( - purl_struct = vulncheck_sdk.models.purl_struct.purl_struct(), + purl_struct = vulncheck_sdk.models.purl/package_urljson.purl.PackageURLJSON( + name = '', + namespace = '', + qualifiers = [ + vulncheck_sdk.models.purl/qualifier_json.purl.QualifierJSON( + key = '', + value = '', ) + ], + subpath = '', + type = '', + version = '', ), timestamp = '', total_documents = 56, ), data = vulncheck_sdk.models.v3controllers/purl_response_data.v3controllers.PurlResponseData( diff --git a/test/blocking/test_render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py b/test/blocking/test_render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py index 8c80a1f0..81f52b56 100644 --- a/test/blocking/test_render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py +++ b/test/blocking/test_render_response_with_metadata_v3controllers_purls_response_data_v3controllers_purls_response_metadata.py @@ -46,7 +46,17 @@ def make_instance(self, include_optional) -> RenderResponseWithMetadataV3control '' ], purl = '', - purl_struct = vulncheck_sdk.models.purl_struct.purl_struct(), + purl_struct = vulncheck_sdk.models.purl/package_urljson.purl.PackageURLJSON( + name = '', + namespace = '', + qualifiers = [ + vulncheck_sdk.models.purl/qualifier_json.purl.QualifierJSON( + key = '', + value = '', ) + ], + subpath = '', + type = '', + version = '', ), research_attributes = vulncheck_sdk.models.api/oss_package_research_attributes.api.OSSPackageResearchAttributes( abandoned = True, eol = True, diff --git a/vulncheck_sdk/__init__.py b/vulncheck_sdk/__init__.py index 244a785d..8eab2517 100644 --- a/vulncheck_sdk/__init__.py +++ b/vulncheck_sdk/__init__.py @@ -15,7 +15,7 @@ """ # noqa: E501 -__version__ = "0.0.41" +__version__ = "0.0.42" # Define package exports __all__ = [ @@ -176,13 +176,11 @@ "AdvisoryCVEDetail", "AdvisoryCVEDetailsLink", "AdvisoryCVEReference", - "AdvisoryCVRFReference", "AdvisoryCVSS", "AdvisoryCVSSV2", "AdvisoryCVSSV3", "AdvisoryCVSSV40", "AdvisoryCVSSV40Threat", - "AdvisoryCWENode", "AdvisoryCanvasExploit", "AdvisoryCapec", "AdvisoryCarestreamAdvisory", @@ -242,7 +240,6 @@ "AdvisoryDanFossCVEDetails", "AdvisoryDanfoss", "AdvisoryDassault", - "AdvisoryDateTime", "AdvisoryDebianCVE", "AdvisoryDebianSecurityAdvisory", "AdvisoryDell", @@ -252,9 +249,7 @@ "AdvisoryDistroVersion", "AdvisoryDjango", "AdvisoryDocumentMetadata", - "AdvisoryDocumentNote", "AdvisoryDocumentPublisher", - "AdvisoryDocumentTracking", "AdvisoryDotCMS", "AdvisoryDragosAdvisory", "AdvisoryDraytek", @@ -369,7 +364,6 @@ "AdvisoryIpIntelRecord", "AdvisoryIsraeliAlert", "AdvisoryIsraeliVulnerability", - "AdvisoryIssued", "AdvisoryIstio", "AdvisoryIvanti", "AdvisoryIvantiRSS", @@ -550,7 +544,6 @@ "AdvisoryProduct", "AdvisoryProductBranch", "AdvisoryProductSpecificDetail", - "AdvisoryProductTree", "AdvisoryProductsAffected", "AdvisoryProgress", "AdvisoryProofpoint", @@ -580,12 +573,10 @@ "AdvisoryRedhatCVE", "AdvisoryReference", "AdvisoryRelatedRule", - "AdvisoryRelationship", "AdvisoryRemediationData", "AdvisoryRenesas", "AdvisoryReportedExploit", "AdvisoryRestartData", - "AdvisoryRevision", "AdvisoryRevisionHistory", "AdvisoryRevive", "AdvisoryRhelCVE", @@ -619,7 +610,6 @@ "AdvisorySchneiderCVE", "AdvisorySchneiderElectricAdvisory", "AdvisorySchutzwerk", - "AdvisoryScoreSet", "AdvisorySecFix", "AdvisorySecurityBulletin", "AdvisorySecurityLab", @@ -671,7 +661,6 @@ "AdvisorySplunk", "AdvisorySplunkProduct", "AdvisorySpring", - "AdvisoryStatus", "AdvisoryStormshield", "AdvisoryStrykerAdvisory", "AdvisorySudo", @@ -693,7 +682,6 @@ "AdvisoryThales", "AdvisoryTheMissingLink", "AdvisoryThermoFisher", - "AdvisoryThreat", "AdvisoryThreatActorWithExternalObjects", "AdvisoryThreatData", "AdvisoryTibco", @@ -714,7 +702,6 @@ "AdvisoryUnify", "AdvisoryUnisoc", "AdvisoryUpdate", - "AdvisoryUpdated", "AdvisoryV3AcceptanceLevel", "AdvisoryVCCPEDictionary", "AdvisoryVCVulnerableCPEs", @@ -736,7 +723,6 @@ "AdvisoryVulnCheckConfig", "AdvisoryVulnCheckKEV", "AdvisoryVulnCheckPackage", - "AdvisoryVulnerability", "AdvisoryVulnerableDebianPackage", "AdvisoryVulnerableProduct", "AdvisoryVulnrichment", @@ -796,7 +782,6 @@ "ApiConfigurations", "ApiCveItems", "ApiCveItemsExtended", - "ApiDateTime", "ApiDescription", "ApiDescriptionData", "ApiEPSS", @@ -1520,13 +1505,11 @@ from vulncheck_sdk.models.advisory_cve_detail import AdvisoryCVEDetail as AdvisoryCVEDetail from vulncheck_sdk.models.advisory_cve_details_link import AdvisoryCVEDetailsLink as AdvisoryCVEDetailsLink from vulncheck_sdk.models.advisory_cve_reference import AdvisoryCVEReference as AdvisoryCVEReference -from vulncheck_sdk.models.advisory_cvrf_reference import AdvisoryCVRFReference as AdvisoryCVRFReference from vulncheck_sdk.models.advisory_cvss import AdvisoryCVSS as AdvisoryCVSS from vulncheck_sdk.models.advisory_cvssv2 import AdvisoryCVSSV2 as AdvisoryCVSSV2 from vulncheck_sdk.models.advisory_cvssv3 import AdvisoryCVSSV3 as AdvisoryCVSSV3 from vulncheck_sdk.models.advisory_cvssv40 import AdvisoryCVSSV40 as AdvisoryCVSSV40 from vulncheck_sdk.models.advisory_cvssv40_threat import AdvisoryCVSSV40Threat as AdvisoryCVSSV40Threat -from vulncheck_sdk.models.advisory_cwe_node import AdvisoryCWENode as AdvisoryCWENode from vulncheck_sdk.models.advisory_canvas_exploit import AdvisoryCanvasExploit as AdvisoryCanvasExploit from vulncheck_sdk.models.advisory_capec import AdvisoryCapec as AdvisoryCapec from vulncheck_sdk.models.advisory_carestream_advisory import AdvisoryCarestreamAdvisory as AdvisoryCarestreamAdvisory @@ -1586,7 +1569,6 @@ from vulncheck_sdk.models.advisory_dan_foss_cve_details import AdvisoryDanFossCVEDetails as AdvisoryDanFossCVEDetails from vulncheck_sdk.models.advisory_danfoss import AdvisoryDanfoss as AdvisoryDanfoss from vulncheck_sdk.models.advisory_dassault import AdvisoryDassault as AdvisoryDassault -from vulncheck_sdk.models.advisory_date_time import AdvisoryDateTime as AdvisoryDateTime from vulncheck_sdk.models.advisory_debian_cve import AdvisoryDebianCVE as AdvisoryDebianCVE from vulncheck_sdk.models.advisory_debian_security_advisory import AdvisoryDebianSecurityAdvisory as AdvisoryDebianSecurityAdvisory from vulncheck_sdk.models.advisory_dell import AdvisoryDell as AdvisoryDell @@ -1596,9 +1578,7 @@ from vulncheck_sdk.models.advisory_distro_version import AdvisoryDistroVersion as AdvisoryDistroVersion from vulncheck_sdk.models.advisory_django import AdvisoryDjango as AdvisoryDjango from vulncheck_sdk.models.advisory_document_metadata import AdvisoryDocumentMetadata as AdvisoryDocumentMetadata -from vulncheck_sdk.models.advisory_document_note import AdvisoryDocumentNote as AdvisoryDocumentNote from vulncheck_sdk.models.advisory_document_publisher import AdvisoryDocumentPublisher as AdvisoryDocumentPublisher -from vulncheck_sdk.models.advisory_document_tracking import AdvisoryDocumentTracking as AdvisoryDocumentTracking from vulncheck_sdk.models.advisory_dot_cms import AdvisoryDotCMS as AdvisoryDotCMS from vulncheck_sdk.models.advisory_dragos_advisory import AdvisoryDragosAdvisory as AdvisoryDragosAdvisory from vulncheck_sdk.models.advisory_draytek import AdvisoryDraytek as AdvisoryDraytek @@ -1713,7 +1693,6 @@ from vulncheck_sdk.models.advisory_ip_intel_record import AdvisoryIpIntelRecord as AdvisoryIpIntelRecord from vulncheck_sdk.models.advisory_israeli_alert import AdvisoryIsraeliAlert as AdvisoryIsraeliAlert from vulncheck_sdk.models.advisory_israeli_vulnerability import AdvisoryIsraeliVulnerability as AdvisoryIsraeliVulnerability -from vulncheck_sdk.models.advisory_issued import AdvisoryIssued as AdvisoryIssued from vulncheck_sdk.models.advisory_istio import AdvisoryIstio as AdvisoryIstio from vulncheck_sdk.models.advisory_ivanti import AdvisoryIvanti as AdvisoryIvanti from vulncheck_sdk.models.advisory_ivanti_rss import AdvisoryIvantiRSS as AdvisoryIvantiRSS @@ -1894,7 +1873,6 @@ from vulncheck_sdk.models.advisory_product import AdvisoryProduct as AdvisoryProduct from vulncheck_sdk.models.advisory_product_branch import AdvisoryProductBranch as AdvisoryProductBranch from vulncheck_sdk.models.advisory_product_specific_detail import AdvisoryProductSpecificDetail as AdvisoryProductSpecificDetail -from vulncheck_sdk.models.advisory_product_tree import AdvisoryProductTree as AdvisoryProductTree from vulncheck_sdk.models.advisory_products_affected import AdvisoryProductsAffected as AdvisoryProductsAffected from vulncheck_sdk.models.advisory_progress import AdvisoryProgress as AdvisoryProgress from vulncheck_sdk.models.advisory_proofpoint import AdvisoryProofpoint as AdvisoryProofpoint @@ -1924,12 +1902,10 @@ from vulncheck_sdk.models.advisory_redhat_cve import AdvisoryRedhatCVE as AdvisoryRedhatCVE from vulncheck_sdk.models.advisory_reference import AdvisoryReference as AdvisoryReference from vulncheck_sdk.models.advisory_related_rule import AdvisoryRelatedRule as AdvisoryRelatedRule -from vulncheck_sdk.models.advisory_relationship import AdvisoryRelationship as AdvisoryRelationship from vulncheck_sdk.models.advisory_remediation_data import AdvisoryRemediationData as AdvisoryRemediationData from vulncheck_sdk.models.advisory_renesas import AdvisoryRenesas as AdvisoryRenesas from vulncheck_sdk.models.advisory_reported_exploit import AdvisoryReportedExploit as AdvisoryReportedExploit from vulncheck_sdk.models.advisory_restart_data import AdvisoryRestartData as AdvisoryRestartData -from vulncheck_sdk.models.advisory_revision import AdvisoryRevision as AdvisoryRevision from vulncheck_sdk.models.advisory_revision_history import AdvisoryRevisionHistory as AdvisoryRevisionHistory from vulncheck_sdk.models.advisory_revive import AdvisoryRevive as AdvisoryRevive from vulncheck_sdk.models.advisory_rhel_cve import AdvisoryRhelCVE as AdvisoryRhelCVE @@ -1963,7 +1939,6 @@ from vulncheck_sdk.models.advisory_schneider_cve import AdvisorySchneiderCVE as AdvisorySchneiderCVE from vulncheck_sdk.models.advisory_schneider_electric_advisory import AdvisorySchneiderElectricAdvisory as AdvisorySchneiderElectricAdvisory from vulncheck_sdk.models.advisory_schutzwerk import AdvisorySchutzwerk as AdvisorySchutzwerk -from vulncheck_sdk.models.advisory_score_set import AdvisoryScoreSet as AdvisoryScoreSet from vulncheck_sdk.models.advisory_sec_fix import AdvisorySecFix as AdvisorySecFix from vulncheck_sdk.models.advisory_security_bulletin import AdvisorySecurityBulletin as AdvisorySecurityBulletin from vulncheck_sdk.models.advisory_security_lab import AdvisorySecurityLab as AdvisorySecurityLab @@ -2015,7 +1990,6 @@ from vulncheck_sdk.models.advisory_splunk import AdvisorySplunk as AdvisorySplunk from vulncheck_sdk.models.advisory_splunk_product import AdvisorySplunkProduct as AdvisorySplunkProduct from vulncheck_sdk.models.advisory_spring import AdvisorySpring as AdvisorySpring -from vulncheck_sdk.models.advisory_status import AdvisoryStatus as AdvisoryStatus from vulncheck_sdk.models.advisory_stormshield import AdvisoryStormshield as AdvisoryStormshield from vulncheck_sdk.models.advisory_stryker_advisory import AdvisoryStrykerAdvisory as AdvisoryStrykerAdvisory from vulncheck_sdk.models.advisory_sudo import AdvisorySudo as AdvisorySudo @@ -2037,7 +2011,6 @@ from vulncheck_sdk.models.advisory_thales import AdvisoryThales as AdvisoryThales from vulncheck_sdk.models.advisory_the_missing_link import AdvisoryTheMissingLink as AdvisoryTheMissingLink from vulncheck_sdk.models.advisory_thermo_fisher import AdvisoryThermoFisher as AdvisoryThermoFisher -from vulncheck_sdk.models.advisory_threat import AdvisoryThreat as AdvisoryThreat from vulncheck_sdk.models.advisory_threat_actor_with_external_objects import AdvisoryThreatActorWithExternalObjects as AdvisoryThreatActorWithExternalObjects from vulncheck_sdk.models.advisory_threat_data import AdvisoryThreatData as AdvisoryThreatData from vulncheck_sdk.models.advisory_tibco import AdvisoryTibco as AdvisoryTibco @@ -2058,7 +2031,6 @@ from vulncheck_sdk.models.advisory_unify import AdvisoryUnify as AdvisoryUnify from vulncheck_sdk.models.advisory_unisoc import AdvisoryUnisoc as AdvisoryUnisoc from vulncheck_sdk.models.advisory_update import AdvisoryUpdate as AdvisoryUpdate -from vulncheck_sdk.models.advisory_updated import AdvisoryUpdated as AdvisoryUpdated from vulncheck_sdk.models.advisory_v3_acceptance_level import AdvisoryV3AcceptanceLevel as AdvisoryV3AcceptanceLevel from vulncheck_sdk.models.advisory_vccpe_dictionary import AdvisoryVCCPEDictionary as AdvisoryVCCPEDictionary from vulncheck_sdk.models.advisory_vc_vulnerable_cpes import AdvisoryVCVulnerableCPEs as AdvisoryVCVulnerableCPEs @@ -2080,7 +2052,6 @@ from vulncheck_sdk.models.advisory_vuln_check_config import AdvisoryVulnCheckConfig as AdvisoryVulnCheckConfig from vulncheck_sdk.models.advisory_vuln_check_kev import AdvisoryVulnCheckKEV as AdvisoryVulnCheckKEV from vulncheck_sdk.models.advisory_vuln_check_package import AdvisoryVulnCheckPackage as AdvisoryVulnCheckPackage -from vulncheck_sdk.models.advisory_vulnerability import AdvisoryVulnerability as AdvisoryVulnerability from vulncheck_sdk.models.advisory_vulnerable_debian_package import AdvisoryVulnerableDebianPackage as AdvisoryVulnerableDebianPackage from vulncheck_sdk.models.advisory_vulnerable_product import AdvisoryVulnerableProduct as AdvisoryVulnerableProduct from vulncheck_sdk.models.advisory_vulnrichment import AdvisoryVulnrichment as AdvisoryVulnrichment @@ -2140,7 +2111,6 @@ from vulncheck_sdk.models.api_configurations import ApiConfigurations as ApiConfigurations from vulncheck_sdk.models.api_cve_items import ApiCveItems as ApiCveItems from vulncheck_sdk.models.api_cve_items_extended import ApiCveItemsExtended as ApiCveItemsExtended -from vulncheck_sdk.models.api_date_time import ApiDateTime as ApiDateTime from vulncheck_sdk.models.api_description import ApiDescription as ApiDescription from vulncheck_sdk.models.api_description_data import ApiDescriptionData as ApiDescriptionData from vulncheck_sdk.models.api_epss import ApiEPSS as ApiEPSS diff --git a/vulncheck_sdk/aio/__init__.py b/vulncheck_sdk/aio/__init__.py index f05ccba1..5c6331f4 100644 --- a/vulncheck_sdk/aio/__init__.py +++ b/vulncheck_sdk/aio/__init__.py @@ -15,7 +15,7 @@ """ # noqa: E501 -__version__ = "0.0.41" +__version__ = "0.0.42" # Define package exports __all__ = [ @@ -176,13 +176,11 @@ "AdvisoryCVEDetail", "AdvisoryCVEDetailsLink", "AdvisoryCVEReference", - "AdvisoryCVRFReference", "AdvisoryCVSS", "AdvisoryCVSSV2", "AdvisoryCVSSV3", "AdvisoryCVSSV40", "AdvisoryCVSSV40Threat", - "AdvisoryCWENode", "AdvisoryCanvasExploit", "AdvisoryCapec", "AdvisoryCarestreamAdvisory", @@ -242,7 +240,6 @@ "AdvisoryDanFossCVEDetails", "AdvisoryDanfoss", "AdvisoryDassault", - "AdvisoryDateTime", "AdvisoryDebianCVE", "AdvisoryDebianSecurityAdvisory", "AdvisoryDell", @@ -252,9 +249,7 @@ "AdvisoryDistroVersion", "AdvisoryDjango", "AdvisoryDocumentMetadata", - "AdvisoryDocumentNote", "AdvisoryDocumentPublisher", - "AdvisoryDocumentTracking", "AdvisoryDotCMS", "AdvisoryDragosAdvisory", "AdvisoryDraytek", @@ -369,7 +364,6 @@ "AdvisoryIpIntelRecord", "AdvisoryIsraeliAlert", "AdvisoryIsraeliVulnerability", - "AdvisoryIssued", "AdvisoryIstio", "AdvisoryIvanti", "AdvisoryIvantiRSS", @@ -550,7 +544,6 @@ "AdvisoryProduct", "AdvisoryProductBranch", "AdvisoryProductSpecificDetail", - "AdvisoryProductTree", "AdvisoryProductsAffected", "AdvisoryProgress", "AdvisoryProofpoint", @@ -580,12 +573,10 @@ "AdvisoryRedhatCVE", "AdvisoryReference", "AdvisoryRelatedRule", - "AdvisoryRelationship", "AdvisoryRemediationData", "AdvisoryRenesas", "AdvisoryReportedExploit", "AdvisoryRestartData", - "AdvisoryRevision", "AdvisoryRevisionHistory", "AdvisoryRevive", "AdvisoryRhelCVE", @@ -619,7 +610,6 @@ "AdvisorySchneiderCVE", "AdvisorySchneiderElectricAdvisory", "AdvisorySchutzwerk", - "AdvisoryScoreSet", "AdvisorySecFix", "AdvisorySecurityBulletin", "AdvisorySecurityLab", @@ -671,7 +661,6 @@ "AdvisorySplunk", "AdvisorySplunkProduct", "AdvisorySpring", - "AdvisoryStatus", "AdvisoryStormshield", "AdvisoryStrykerAdvisory", "AdvisorySudo", @@ -693,7 +682,6 @@ "AdvisoryThales", "AdvisoryTheMissingLink", "AdvisoryThermoFisher", - "AdvisoryThreat", "AdvisoryThreatActorWithExternalObjects", "AdvisoryThreatData", "AdvisoryTibco", @@ -714,7 +702,6 @@ "AdvisoryUnify", "AdvisoryUnisoc", "AdvisoryUpdate", - "AdvisoryUpdated", "AdvisoryV3AcceptanceLevel", "AdvisoryVCCPEDictionary", "AdvisoryVCVulnerableCPEs", @@ -736,7 +723,6 @@ "AdvisoryVulnCheckConfig", "AdvisoryVulnCheckKEV", "AdvisoryVulnCheckPackage", - "AdvisoryVulnerability", "AdvisoryVulnerableDebianPackage", "AdvisoryVulnerableProduct", "AdvisoryVulnrichment", @@ -796,7 +782,6 @@ "ApiConfigurations", "ApiCveItems", "ApiCveItemsExtended", - "ApiDateTime", "ApiDescription", "ApiDescriptionData", "ApiEPSS", @@ -1520,13 +1505,11 @@ from vulncheck_sdk.aio.models.advisory_cve_detail import AdvisoryCVEDetail as AdvisoryCVEDetail from vulncheck_sdk.aio.models.advisory_cve_details_link import AdvisoryCVEDetailsLink as AdvisoryCVEDetailsLink from vulncheck_sdk.aio.models.advisory_cve_reference import AdvisoryCVEReference as AdvisoryCVEReference -from vulncheck_sdk.aio.models.advisory_cvrf_reference import AdvisoryCVRFReference as AdvisoryCVRFReference from vulncheck_sdk.aio.models.advisory_cvss import AdvisoryCVSS as AdvisoryCVSS from vulncheck_sdk.aio.models.advisory_cvssv2 import AdvisoryCVSSV2 as AdvisoryCVSSV2 from vulncheck_sdk.aio.models.advisory_cvssv3 import AdvisoryCVSSV3 as AdvisoryCVSSV3 from vulncheck_sdk.aio.models.advisory_cvssv40 import AdvisoryCVSSV40 as AdvisoryCVSSV40 from vulncheck_sdk.aio.models.advisory_cvssv40_threat import AdvisoryCVSSV40Threat as AdvisoryCVSSV40Threat -from vulncheck_sdk.aio.models.advisory_cwe_node import AdvisoryCWENode as AdvisoryCWENode from vulncheck_sdk.aio.models.advisory_canvas_exploit import AdvisoryCanvasExploit as AdvisoryCanvasExploit from vulncheck_sdk.aio.models.advisory_capec import AdvisoryCapec as AdvisoryCapec from vulncheck_sdk.aio.models.advisory_carestream_advisory import AdvisoryCarestreamAdvisory as AdvisoryCarestreamAdvisory @@ -1586,7 +1569,6 @@ from vulncheck_sdk.aio.models.advisory_dan_foss_cve_details import AdvisoryDanFossCVEDetails as AdvisoryDanFossCVEDetails from vulncheck_sdk.aio.models.advisory_danfoss import AdvisoryDanfoss as AdvisoryDanfoss from vulncheck_sdk.aio.models.advisory_dassault import AdvisoryDassault as AdvisoryDassault -from vulncheck_sdk.aio.models.advisory_date_time import AdvisoryDateTime as AdvisoryDateTime from vulncheck_sdk.aio.models.advisory_debian_cve import AdvisoryDebianCVE as AdvisoryDebianCVE from vulncheck_sdk.aio.models.advisory_debian_security_advisory import AdvisoryDebianSecurityAdvisory as AdvisoryDebianSecurityAdvisory from vulncheck_sdk.aio.models.advisory_dell import AdvisoryDell as AdvisoryDell @@ -1596,9 +1578,7 @@ from vulncheck_sdk.aio.models.advisory_distro_version import AdvisoryDistroVersion as AdvisoryDistroVersion from vulncheck_sdk.aio.models.advisory_django import AdvisoryDjango as AdvisoryDjango from vulncheck_sdk.aio.models.advisory_document_metadata import AdvisoryDocumentMetadata as AdvisoryDocumentMetadata -from vulncheck_sdk.aio.models.advisory_document_note import AdvisoryDocumentNote as AdvisoryDocumentNote from vulncheck_sdk.aio.models.advisory_document_publisher import AdvisoryDocumentPublisher as AdvisoryDocumentPublisher -from vulncheck_sdk.aio.models.advisory_document_tracking import AdvisoryDocumentTracking as AdvisoryDocumentTracking from vulncheck_sdk.aio.models.advisory_dot_cms import AdvisoryDotCMS as AdvisoryDotCMS from vulncheck_sdk.aio.models.advisory_dragos_advisory import AdvisoryDragosAdvisory as AdvisoryDragosAdvisory from vulncheck_sdk.aio.models.advisory_draytek import AdvisoryDraytek as AdvisoryDraytek @@ -1713,7 +1693,6 @@ from vulncheck_sdk.aio.models.advisory_ip_intel_record import AdvisoryIpIntelRecord as AdvisoryIpIntelRecord from vulncheck_sdk.aio.models.advisory_israeli_alert import AdvisoryIsraeliAlert as AdvisoryIsraeliAlert from vulncheck_sdk.aio.models.advisory_israeli_vulnerability import AdvisoryIsraeliVulnerability as AdvisoryIsraeliVulnerability -from vulncheck_sdk.aio.models.advisory_issued import AdvisoryIssued as AdvisoryIssued from vulncheck_sdk.aio.models.advisory_istio import AdvisoryIstio as AdvisoryIstio from vulncheck_sdk.aio.models.advisory_ivanti import AdvisoryIvanti as AdvisoryIvanti from vulncheck_sdk.aio.models.advisory_ivanti_rss import AdvisoryIvantiRSS as AdvisoryIvantiRSS @@ -1894,7 +1873,6 @@ from vulncheck_sdk.aio.models.advisory_product import AdvisoryProduct as AdvisoryProduct from vulncheck_sdk.aio.models.advisory_product_branch import AdvisoryProductBranch as AdvisoryProductBranch from vulncheck_sdk.aio.models.advisory_product_specific_detail import AdvisoryProductSpecificDetail as AdvisoryProductSpecificDetail -from vulncheck_sdk.aio.models.advisory_product_tree import AdvisoryProductTree as AdvisoryProductTree from vulncheck_sdk.aio.models.advisory_products_affected import AdvisoryProductsAffected as AdvisoryProductsAffected from vulncheck_sdk.aio.models.advisory_progress import AdvisoryProgress as AdvisoryProgress from vulncheck_sdk.aio.models.advisory_proofpoint import AdvisoryProofpoint as AdvisoryProofpoint @@ -1924,12 +1902,10 @@ from vulncheck_sdk.aio.models.advisory_redhat_cve import AdvisoryRedhatCVE as AdvisoryRedhatCVE from vulncheck_sdk.aio.models.advisory_reference import AdvisoryReference as AdvisoryReference from vulncheck_sdk.aio.models.advisory_related_rule import AdvisoryRelatedRule as AdvisoryRelatedRule -from vulncheck_sdk.aio.models.advisory_relationship import AdvisoryRelationship as AdvisoryRelationship from vulncheck_sdk.aio.models.advisory_remediation_data import AdvisoryRemediationData as AdvisoryRemediationData from vulncheck_sdk.aio.models.advisory_renesas import AdvisoryRenesas as AdvisoryRenesas from vulncheck_sdk.aio.models.advisory_reported_exploit import AdvisoryReportedExploit as AdvisoryReportedExploit from vulncheck_sdk.aio.models.advisory_restart_data import AdvisoryRestartData as AdvisoryRestartData -from vulncheck_sdk.aio.models.advisory_revision import AdvisoryRevision as AdvisoryRevision from vulncheck_sdk.aio.models.advisory_revision_history import AdvisoryRevisionHistory as AdvisoryRevisionHistory from vulncheck_sdk.aio.models.advisory_revive import AdvisoryRevive as AdvisoryRevive from vulncheck_sdk.aio.models.advisory_rhel_cve import AdvisoryRhelCVE as AdvisoryRhelCVE @@ -1963,7 +1939,6 @@ from vulncheck_sdk.aio.models.advisory_schneider_cve import AdvisorySchneiderCVE as AdvisorySchneiderCVE from vulncheck_sdk.aio.models.advisory_schneider_electric_advisory import AdvisorySchneiderElectricAdvisory as AdvisorySchneiderElectricAdvisory from vulncheck_sdk.aio.models.advisory_schutzwerk import AdvisorySchutzwerk as AdvisorySchutzwerk -from vulncheck_sdk.aio.models.advisory_score_set import AdvisoryScoreSet as AdvisoryScoreSet from vulncheck_sdk.aio.models.advisory_sec_fix import AdvisorySecFix as AdvisorySecFix from vulncheck_sdk.aio.models.advisory_security_bulletin import AdvisorySecurityBulletin as AdvisorySecurityBulletin from vulncheck_sdk.aio.models.advisory_security_lab import AdvisorySecurityLab as AdvisorySecurityLab @@ -2015,7 +1990,6 @@ from vulncheck_sdk.aio.models.advisory_splunk import AdvisorySplunk as AdvisorySplunk from vulncheck_sdk.aio.models.advisory_splunk_product import AdvisorySplunkProduct as AdvisorySplunkProduct from vulncheck_sdk.aio.models.advisory_spring import AdvisorySpring as AdvisorySpring -from vulncheck_sdk.aio.models.advisory_status import AdvisoryStatus as AdvisoryStatus from vulncheck_sdk.aio.models.advisory_stormshield import AdvisoryStormshield as AdvisoryStormshield from vulncheck_sdk.aio.models.advisory_stryker_advisory import AdvisoryStrykerAdvisory as AdvisoryStrykerAdvisory from vulncheck_sdk.aio.models.advisory_sudo import AdvisorySudo as AdvisorySudo @@ -2037,7 +2011,6 @@ from vulncheck_sdk.aio.models.advisory_thales import AdvisoryThales as AdvisoryThales from vulncheck_sdk.aio.models.advisory_the_missing_link import AdvisoryTheMissingLink as AdvisoryTheMissingLink from vulncheck_sdk.aio.models.advisory_thermo_fisher import AdvisoryThermoFisher as AdvisoryThermoFisher -from vulncheck_sdk.aio.models.advisory_threat import AdvisoryThreat as AdvisoryThreat from vulncheck_sdk.aio.models.advisory_threat_actor_with_external_objects import AdvisoryThreatActorWithExternalObjects as AdvisoryThreatActorWithExternalObjects from vulncheck_sdk.aio.models.advisory_threat_data import AdvisoryThreatData as AdvisoryThreatData from vulncheck_sdk.aio.models.advisory_tibco import AdvisoryTibco as AdvisoryTibco @@ -2058,7 +2031,6 @@ from vulncheck_sdk.aio.models.advisory_unify import AdvisoryUnify as AdvisoryUnify from vulncheck_sdk.aio.models.advisory_unisoc import AdvisoryUnisoc as AdvisoryUnisoc from vulncheck_sdk.aio.models.advisory_update import AdvisoryUpdate as AdvisoryUpdate -from vulncheck_sdk.aio.models.advisory_updated import AdvisoryUpdated as AdvisoryUpdated from vulncheck_sdk.aio.models.advisory_v3_acceptance_level import AdvisoryV3AcceptanceLevel as AdvisoryV3AcceptanceLevel from vulncheck_sdk.aio.models.advisory_vccpe_dictionary import AdvisoryVCCPEDictionary as AdvisoryVCCPEDictionary from vulncheck_sdk.aio.models.advisory_vc_vulnerable_cpes import AdvisoryVCVulnerableCPEs as AdvisoryVCVulnerableCPEs @@ -2080,7 +2052,6 @@ from vulncheck_sdk.aio.models.advisory_vuln_check_config import AdvisoryVulnCheckConfig as AdvisoryVulnCheckConfig from vulncheck_sdk.aio.models.advisory_vuln_check_kev import AdvisoryVulnCheckKEV as AdvisoryVulnCheckKEV from vulncheck_sdk.aio.models.advisory_vuln_check_package import AdvisoryVulnCheckPackage as AdvisoryVulnCheckPackage -from vulncheck_sdk.aio.models.advisory_vulnerability import AdvisoryVulnerability as AdvisoryVulnerability from vulncheck_sdk.aio.models.advisory_vulnerable_debian_package import AdvisoryVulnerableDebianPackage as AdvisoryVulnerableDebianPackage from vulncheck_sdk.aio.models.advisory_vulnerable_product import AdvisoryVulnerableProduct as AdvisoryVulnerableProduct from vulncheck_sdk.aio.models.advisory_vulnrichment import AdvisoryVulnrichment as AdvisoryVulnrichment @@ -2140,7 +2111,6 @@ from vulncheck_sdk.aio.models.api_configurations import ApiConfigurations as ApiConfigurations from vulncheck_sdk.aio.models.api_cve_items import ApiCveItems as ApiCveItems from vulncheck_sdk.aio.models.api_cve_items_extended import ApiCveItemsExtended as ApiCveItemsExtended -from vulncheck_sdk.aio.models.api_date_time import ApiDateTime as ApiDateTime from vulncheck_sdk.aio.models.api_description import ApiDescription as ApiDescription from vulncheck_sdk.aio.models.api_description_data import ApiDescriptionData as ApiDescriptionData from vulncheck_sdk.aio.models.api_epss import ApiEPSS as ApiEPSS diff --git a/vulncheck_sdk/aio/api/endpoints_api.py b/vulncheck_sdk/aio/api/endpoints_api.py index ad93976e..6b95ded9 100644 --- a/vulncheck_sdk/aio/api/endpoints_api.py +++ b/vulncheck_sdk/aio/api/endpoints_api.py @@ -2145,7 +2145,7 @@ def _purl_get_serialize( @validate_call async def purls_post( self, - purls: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], + request_body: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], _request_timeout: Union[ None, Annotated[StrictFloat, Field(gt=0)], @@ -2163,8 +2163,8 @@ async def purls_post( Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities - :param purls: PURL strings used to identify and locate software packages (required) - :type purls: List[str] + :param request_body: PURL strings used to identify and locate software packages (required) + :type request_body: List[str] :param _request_timeout: timeout setting for this request. If one number provided, it will be total request timeout. It can also be a pair (tuple) of @@ -2188,7 +2188,7 @@ async def purls_post( """ # noqa: E501 _param = self._purls_post_serialize( - purls=purls, + request_body=request_body, _request_auth=_request_auth, _content_type=_content_type, _headers=_headers, @@ -2214,7 +2214,7 @@ async def purls_post( @validate_call async def purls_post_with_http_info( self, - purls: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], + request_body: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], _request_timeout: Union[ None, Annotated[StrictFloat, Field(gt=0)], @@ -2232,8 +2232,8 @@ async def purls_post_with_http_info( Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities - :param purls: PURL strings used to identify and locate software packages (required) - :type purls: List[str] + :param request_body: PURL strings used to identify and locate software packages (required) + :type request_body: List[str] :param _request_timeout: timeout setting for this request. If one number provided, it will be total request timeout. It can also be a pair (tuple) of @@ -2257,7 +2257,7 @@ async def purls_post_with_http_info( """ # noqa: E501 _param = self._purls_post_serialize( - purls=purls, + request_body=request_body, _request_auth=_request_auth, _content_type=_content_type, _headers=_headers, @@ -2283,7 +2283,7 @@ async def purls_post_with_http_info( @validate_call async def purls_post_without_preload_content( self, - purls: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], + request_body: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], _request_timeout: Union[ None, Annotated[StrictFloat, Field(gt=0)], @@ -2301,8 +2301,8 @@ async def purls_post_without_preload_content( Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities - :param purls: PURL strings used to identify and locate software packages (required) - :type purls: List[str] + :param request_body: PURL strings used to identify and locate software packages (required) + :type request_body: List[str] :param _request_timeout: timeout setting for this request. If one number provided, it will be total request timeout. It can also be a pair (tuple) of @@ -2326,7 +2326,7 @@ async def purls_post_without_preload_content( """ # noqa: E501 _param = self._purls_post_serialize( - purls=purls, + request_body=request_body, _request_auth=_request_auth, _content_type=_content_type, _headers=_headers, @@ -2347,7 +2347,7 @@ async def purls_post_without_preload_content( def _purls_post_serialize( self, - purls, + request_body, _request_auth, _content_type, _headers, @@ -2357,7 +2357,7 @@ def _purls_post_serialize( _host = None _collection_formats: Dict[str, str] = { - 'purls': '', + 'request_body': '', } _path_params: Dict[str, str] = {} @@ -2374,8 +2374,8 @@ def _purls_post_serialize( # process the header parameters # process the form parameters # process the body parameter - if purls is not None: - _body_params = purls + if request_body is not None: + _body_params = request_body # set the HTTP header `Accept` @@ -2386,6 +2386,19 @@ def _purls_post_serialize( ] ) + # set the HTTP header `Content-Type` + if _content_type: + _header_params['Content-Type'] = _content_type + else: + _default_content_type = ( + self.api_client.select_header_content_type( + [ + 'application/json' + ] + ) + ) + if _default_content_type is not None: + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ diff --git a/vulncheck_sdk/aio/api/indices_api.py b/vulncheck_sdk/aio/api/indices_api.py index c7937b44..48008ade 100644 --- a/vulncheck_sdk/aio/api/indices_api.py +++ b/vulncheck_sdk/aio/api/indices_api.py @@ -519,8 +519,7 @@ async def index7zip_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -578,10 +577,8 @@ async def index7zip_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -635,7 +632,6 @@ async def index7zip_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -684,8 +680,7 @@ async def index7zip_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -743,10 +738,8 @@ async def index7zip_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -800,7 +793,6 @@ async def index7zip_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -849,8 +841,7 @@ async def index7zip_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -908,10 +899,8 @@ async def index7zip_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -965,7 +954,6 @@ async def index7zip_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -1010,7 +998,6 @@ def _index7zip_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -1111,10 +1098,6 @@ def _index7zip_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -1196,8 +1179,7 @@ async def index_a10_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -1255,10 +1237,8 @@ async def index_a10_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -1312,7 +1292,6 @@ async def index_a10_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -1361,8 +1340,7 @@ async def index_a10_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -1420,10 +1398,8 @@ async def index_a10_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -1477,7 +1453,6 @@ async def index_a10_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -1526,8 +1501,7 @@ async def index_a10_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -1585,10 +1559,8 @@ async def index_a10_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -1642,7 +1614,6 @@ async def index_a10_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -1687,7 +1658,6 @@ def _index_a10_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -1788,10 +1758,6 @@ def _index_a10_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -1873,8 +1839,7 @@ async def index_abb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -1932,10 +1897,8 @@ async def index_abb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -1989,7 +1952,6 @@ async def index_abb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2038,8 +2000,7 @@ async def index_abb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2097,10 +2058,8 @@ async def index_abb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2154,7 +2113,6 @@ async def index_abb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2203,8 +2161,7 @@ async def index_abb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2262,10 +2219,8 @@ async def index_abb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2319,7 +2274,6 @@ async def index_abb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2364,7 +2318,6 @@ def _index_abb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -2465,10 +2418,6 @@ def _index_abb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -2550,8 +2499,7 @@ async def index_abbott_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2609,10 +2557,8 @@ async def index_abbott_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2666,7 +2612,6 @@ async def index_abbott_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2715,8 +2660,7 @@ async def index_abbott_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2774,10 +2718,8 @@ async def index_abbott_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2831,7 +2773,6 @@ async def index_abbott_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2880,8 +2821,7 @@ async def index_abbott_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2939,10 +2879,8 @@ async def index_abbott_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2996,7 +2934,6 @@ async def index_abbott_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -3041,7 +2978,6 @@ def _index_abbott_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -3142,10 +3078,6 @@ def _index_abbott_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -3227,8 +3159,7 @@ async def index_absolute_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -3286,10 +3217,8 @@ async def index_absolute_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -3343,7 +3272,6 @@ async def index_absolute_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -3392,8 +3320,7 @@ async def index_absolute_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -3451,10 +3378,8 @@ async def index_absolute_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -3508,7 +3433,6 @@ async def index_absolute_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -3557,8 +3481,7 @@ async def index_absolute_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -3616,10 +3539,8 @@ async def index_absolute_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -3673,7 +3594,6 @@ async def index_absolute_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -3718,7 +3638,6 @@ def _index_absolute_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -3819,10 +3738,6 @@ def _index_absolute_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -3904,8 +3819,7 @@ async def index_acronis_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -3963,10 +3877,8 @@ async def index_acronis_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4020,7 +3932,6 @@ async def index_acronis_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4069,8 +3980,7 @@ async def index_acronis_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4128,10 +4038,8 @@ async def index_acronis_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4185,7 +4093,6 @@ async def index_acronis_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4234,8 +4141,7 @@ async def index_acronis_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4293,10 +4199,8 @@ async def index_acronis_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4350,7 +4254,6 @@ async def index_acronis_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4395,7 +4298,6 @@ def _index_acronis_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -4496,10 +4398,6 @@ def _index_acronis_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -4581,8 +4479,7 @@ async def index_adobe_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4640,10 +4537,8 @@ async def index_adobe_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4697,7 +4592,6 @@ async def index_adobe_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4746,8 +4640,7 @@ async def index_adobe_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4805,10 +4698,8 @@ async def index_adobe_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4862,7 +4753,6 @@ async def index_adobe_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4911,8 +4801,7 @@ async def index_adobe_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4970,10 +4859,8 @@ async def index_adobe_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -5027,7 +4914,6 @@ async def index_adobe_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -5072,7 +4958,6 @@ def _index_adobe_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -5173,10 +5058,6 @@ def _index_adobe_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -5258,8 +5139,7 @@ async def index_advantech_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -5317,10 +5197,8 @@ async def index_advantech_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -5374,7 +5252,6 @@ async def index_advantech_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -5423,8 +5300,7 @@ async def index_advantech_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -5482,10 +5358,8 @@ async def index_advantech_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -5539,7 +5413,6 @@ async def index_advantech_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -5588,8 +5461,7 @@ async def index_advantech_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -5647,10 +5519,8 @@ async def index_advantech_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -5704,7 +5574,6 @@ async def index_advantech_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -5749,7 +5618,6 @@ def _index_advantech_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -5850,10 +5718,6 @@ def _index_advantech_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -5935,8 +5799,7 @@ async def index_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -5994,10 +5857,8 @@ async def index_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6051,7 +5912,6 @@ async def index_advisories_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6100,8 +5960,7 @@ async def index_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6159,10 +6018,8 @@ async def index_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6216,7 +6073,6 @@ async def index_advisories_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6265,8 +6121,7 @@ async def index_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6324,10 +6179,8 @@ async def index_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6381,7 +6234,6 @@ async def index_advisories_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6426,7 +6278,6 @@ def _index_advisories_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -6527,10 +6378,6 @@ def _index_advisories_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -6612,8 +6459,7 @@ async def index_aix_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6671,10 +6517,8 @@ async def index_aix_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6728,7 +6572,6 @@ async def index_aix_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6777,8 +6620,7 @@ async def index_aix_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6836,10 +6678,8 @@ async def index_aix_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6893,7 +6733,6 @@ async def index_aix_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6942,8 +6781,7 @@ async def index_aix_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -7001,10 +6839,8 @@ async def index_aix_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -7058,7 +6894,6 @@ async def index_aix_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -7103,7 +6938,6 @@ def _index_aix_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -7204,10 +7038,6 @@ def _index_aix_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -7289,8 +7119,7 @@ async def index_aleph_research_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -7348,10 +7177,8 @@ async def index_aleph_research_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -7405,7 +7232,6 @@ async def index_aleph_research_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -7454,8 +7280,7 @@ async def index_aleph_research_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -7513,10 +7338,8 @@ async def index_aleph_research_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -7570,7 +7393,6 @@ async def index_aleph_research_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -7619,8 +7441,7 @@ async def index_aleph_research_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -7678,10 +7499,8 @@ async def index_aleph_research_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -7735,7 +7554,6 @@ async def index_aleph_research_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -7780,7 +7598,6 @@ def _index_aleph_research_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -7881,10 +7698,6 @@ def _index_aleph_research_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -7966,8 +7779,7 @@ async def index_alibaba_advs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8025,10 +7837,8 @@ async def index_alibaba_advs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8082,7 +7892,6 @@ async def index_alibaba_advs_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8131,8 +7940,7 @@ async def index_alibaba_advs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8190,10 +7998,8 @@ async def index_alibaba_advs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8247,7 +8053,6 @@ async def index_alibaba_advs_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8296,8 +8101,7 @@ async def index_alibaba_advs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8355,10 +8159,8 @@ async def index_alibaba_advs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8412,7 +8214,6 @@ async def index_alibaba_advs_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8457,7 +8258,6 @@ def _index_alibaba_advs_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -8558,10 +8358,6 @@ def _index_alibaba_advs_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -8643,8 +8439,7 @@ async def index_alma_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8702,10 +8497,8 @@ async def index_alma_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8759,7 +8552,6 @@ async def index_alma_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8808,8 +8600,7 @@ async def index_alma_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8867,10 +8658,8 @@ async def index_alma_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8924,7 +8713,6 @@ async def index_alma_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8973,8 +8761,7 @@ async def index_alma_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -9032,10 +8819,8 @@ async def index_alma_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -9089,7 +8874,6 @@ async def index_alma_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -9134,7 +8918,6 @@ def _index_alma_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -9235,10 +9018,6 @@ def _index_alma_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -9320,8 +9099,7 @@ async def index_alpine_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -9379,10 +9157,8 @@ async def index_alpine_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -9436,7 +9212,6 @@ async def index_alpine_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -9485,8 +9260,7 @@ async def index_alpine_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -9544,10 +9318,8 @@ async def index_alpine_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -9601,7 +9373,6 @@ async def index_alpine_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -9650,8 +9421,7 @@ async def index_alpine_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -9709,10 +9479,8 @@ async def index_alpine_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -9766,7 +9534,6 @@ async def index_alpine_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -9811,7 +9578,6 @@ def _index_alpine_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -9912,10 +9678,6 @@ def _index_alpine_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -9997,8 +9759,7 @@ async def index_alpine_purls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10056,10 +9817,8 @@ async def index_alpine_purls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10113,7 +9872,6 @@ async def index_alpine_purls_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -10162,8 +9920,7 @@ async def index_alpine_purls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10221,10 +9978,8 @@ async def index_alpine_purls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10278,7 +10033,6 @@ async def index_alpine_purls_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -10327,8 +10081,7 @@ async def index_alpine_purls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10386,10 +10139,8 @@ async def index_alpine_purls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10443,7 +10194,6 @@ async def index_alpine_purls_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -10488,7 +10238,6 @@ def _index_alpine_purls_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -10589,10 +10338,6 @@ def _index_alpine_purls_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -10674,8 +10419,7 @@ async def index_amazon_cve_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10733,10 +10477,8 @@ async def index_amazon_cve_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10790,7 +10532,6 @@ async def index_amazon_cve_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -10839,8 +10580,7 @@ async def index_amazon_cve_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10898,10 +10638,8 @@ async def index_amazon_cve_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10955,7 +10693,6 @@ async def index_amazon_cve_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11004,8 +10741,7 @@ async def index_amazon_cve_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -11063,10 +10799,8 @@ async def index_amazon_cve_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -11120,7 +10854,6 @@ async def index_amazon_cve_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11165,7 +10898,6 @@ def _index_amazon_cve_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -11266,10 +10998,6 @@ def _index_amazon_cve_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -11351,8 +11079,7 @@ async def index_amazon_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -11410,10 +11137,8 @@ async def index_amazon_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -11467,7 +11192,6 @@ async def index_amazon_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11516,8 +11240,7 @@ async def index_amazon_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -11575,10 +11298,8 @@ async def index_amazon_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -11632,7 +11353,6 @@ async def index_amazon_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11681,8 +11401,7 @@ async def index_amazon_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -11740,10 +11459,8 @@ async def index_amazon_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -11797,7 +11514,6 @@ async def index_amazon_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11842,7 +11558,6 @@ def _index_amazon_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -11943,10 +11658,6 @@ def _index_amazon_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -12028,8 +11739,7 @@ async def index_amd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12087,10 +11797,8 @@ async def index_amd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12144,7 +11852,6 @@ async def index_amd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -12193,8 +11900,7 @@ async def index_amd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12252,10 +11958,8 @@ async def index_amd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12309,7 +12013,6 @@ async def index_amd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -12358,8 +12061,7 @@ async def index_amd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12417,10 +12119,8 @@ async def index_amd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12474,7 +12174,6 @@ async def index_amd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -12519,7 +12218,6 @@ def _index_amd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -12620,10 +12318,6 @@ def _index_amd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -12705,8 +12399,7 @@ async def index_ami_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12764,10 +12457,8 @@ async def index_ami_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12821,7 +12512,6 @@ async def index_ami_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -12870,8 +12560,7 @@ async def index_ami_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12929,10 +12618,8 @@ async def index_ami_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12986,7 +12673,6 @@ async def index_ami_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13035,8 +12721,7 @@ async def index_ami_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -13094,10 +12779,8 @@ async def index_ami_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -13151,7 +12834,6 @@ async def index_ami_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13196,7 +12878,6 @@ def _index_ami_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -13297,10 +12978,6 @@ def _index_ami_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -13382,8 +13059,7 @@ async def index_anchore_nvd_override_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -13441,10 +13117,8 @@ async def index_anchore_nvd_override_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -13498,7 +13172,6 @@ async def index_anchore_nvd_override_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13547,8 +13220,7 @@ async def index_anchore_nvd_override_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -13606,10 +13278,8 @@ async def index_anchore_nvd_override_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -13663,7 +13333,6 @@ async def index_anchore_nvd_override_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13712,8 +13381,7 @@ async def index_anchore_nvd_override_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -13771,10 +13439,8 @@ async def index_anchore_nvd_override_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -13828,7 +13494,6 @@ async def index_anchore_nvd_override_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13873,7 +13538,6 @@ def _index_anchore_nvd_override_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -13974,10 +13638,6 @@ def _index_anchore_nvd_override_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -14059,8 +13719,7 @@ async def index_android_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14118,10 +13777,8 @@ async def index_android_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -14175,7 +13832,6 @@ async def index_android_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -14224,8 +13880,7 @@ async def index_android_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14283,10 +13938,8 @@ async def index_android_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -14340,7 +13993,6 @@ async def index_android_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -14389,8 +14041,7 @@ async def index_android_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14448,10 +14099,8 @@ async def index_android_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -14505,7 +14154,6 @@ async def index_android_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -14550,7 +14198,6 @@ def _index_android_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -14651,10 +14298,6 @@ def _index_android_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -14736,8 +14379,7 @@ async def index_apache_activemq_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14795,10 +14437,8 @@ async def index_apache_activemq_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -14852,7 +14492,6 @@ async def index_apache_activemq_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -14901,8 +14540,7 @@ async def index_apache_activemq_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14960,10 +14598,8 @@ async def index_apache_activemq_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15017,7 +14653,6 @@ async def index_apache_activemq_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15066,8 +14701,7 @@ async def index_apache_activemq_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -15125,10 +14759,8 @@ async def index_apache_activemq_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15182,7 +14814,6 @@ async def index_apache_activemq_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15227,7 +14858,6 @@ def _index_apache_activemq_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -15328,10 +14958,6 @@ def _index_apache_activemq_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -15413,8 +15039,7 @@ async def index_apache_archiva_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -15472,10 +15097,8 @@ async def index_apache_archiva_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15529,7 +15152,6 @@ async def index_apache_archiva_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15578,8 +15200,7 @@ async def index_apache_archiva_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -15637,10 +15258,8 @@ async def index_apache_archiva_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15694,7 +15313,6 @@ async def index_apache_archiva_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15743,8 +15361,7 @@ async def index_apache_archiva_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -15802,10 +15419,8 @@ async def index_apache_archiva_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15859,7 +15474,6 @@ async def index_apache_archiva_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15904,7 +15518,6 @@ def _index_apache_archiva_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -16005,10 +15618,6 @@ def _index_apache_archiva_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -16090,8 +15699,7 @@ async def index_apache_arrow_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16149,10 +15757,8 @@ async def index_apache_arrow_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -16206,7 +15812,6 @@ async def index_apache_arrow_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -16255,8 +15860,7 @@ async def index_apache_arrow_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16314,10 +15918,8 @@ async def index_apache_arrow_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -16371,7 +15973,6 @@ async def index_apache_arrow_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -16420,8 +16021,7 @@ async def index_apache_arrow_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16479,10 +16079,8 @@ async def index_apache_arrow_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -16536,7 +16134,6 @@ async def index_apache_arrow_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -16581,7 +16178,6 @@ def _index_apache_arrow_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -16682,10 +16278,6 @@ def _index_apache_arrow_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -16767,8 +16359,7 @@ async def index_apache_camel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16826,10 +16417,8 @@ async def index_apache_camel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -16883,7 +16472,6 @@ async def index_apache_camel_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -16932,8 +16520,7 @@ async def index_apache_camel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16991,10 +16578,8 @@ async def index_apache_camel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17048,7 +16633,6 @@ async def index_apache_camel_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17097,8 +16681,7 @@ async def index_apache_camel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -17156,10 +16739,8 @@ async def index_apache_camel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17213,7 +16794,6 @@ async def index_apache_camel_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17258,7 +16838,6 @@ def _index_apache_camel_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -17359,10 +16938,6 @@ def _index_apache_camel_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -17444,8 +17019,7 @@ async def index_apache_commons_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -17503,10 +17077,8 @@ async def index_apache_commons_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17560,7 +17132,6 @@ async def index_apache_commons_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17609,8 +17180,7 @@ async def index_apache_commons_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -17668,10 +17238,8 @@ async def index_apache_commons_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17725,7 +17293,6 @@ async def index_apache_commons_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17774,8 +17341,7 @@ async def index_apache_commons_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -17833,10 +17399,8 @@ async def index_apache_commons_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17890,7 +17454,6 @@ async def index_apache_commons_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17935,7 +17498,6 @@ def _index_apache_commons_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -18036,10 +17598,6 @@ def _index_apache_commons_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -18121,8 +17679,7 @@ async def index_apache_couchdb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18180,10 +17737,8 @@ async def index_apache_couchdb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -18237,7 +17792,6 @@ async def index_apache_couchdb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -18286,8 +17840,7 @@ async def index_apache_couchdb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18345,10 +17898,8 @@ async def index_apache_couchdb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -18402,7 +17953,6 @@ async def index_apache_couchdb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -18451,8 +18001,7 @@ async def index_apache_couchdb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18510,10 +18059,8 @@ async def index_apache_couchdb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -18567,7 +18114,6 @@ async def index_apache_couchdb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -18612,7 +18158,6 @@ def _index_apache_couchdb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -18713,10 +18258,6 @@ def _index_apache_couchdb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -18798,8 +18339,7 @@ async def index_apache_flink_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18857,10 +18397,8 @@ async def index_apache_flink_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -18914,7 +18452,6 @@ async def index_apache_flink_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -18963,8 +18500,7 @@ async def index_apache_flink_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19022,10 +18558,8 @@ async def index_apache_flink_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19079,7 +18613,6 @@ async def index_apache_flink_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19128,8 +18661,7 @@ async def index_apache_flink_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19187,10 +18719,8 @@ async def index_apache_flink_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19244,7 +18774,6 @@ async def index_apache_flink_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19289,7 +18818,6 @@ def _index_apache_flink_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -19390,10 +18918,6 @@ def _index_apache_flink_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -19475,8 +18999,7 @@ async def index_apache_guacamole_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19534,10 +19057,8 @@ async def index_apache_guacamole_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19591,7 +19112,6 @@ async def index_apache_guacamole_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19640,8 +19160,7 @@ async def index_apache_guacamole_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19699,10 +19218,8 @@ async def index_apache_guacamole_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19756,7 +19273,6 @@ async def index_apache_guacamole_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19805,8 +19321,7 @@ async def index_apache_guacamole_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19864,10 +19379,8 @@ async def index_apache_guacamole_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19921,7 +19434,6 @@ async def index_apache_guacamole_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19966,7 +19478,6 @@ def _index_apache_guacamole_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -20067,10 +19578,6 @@ def _index_apache_guacamole_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -20152,8 +19659,7 @@ async def index_apache_hadoop_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -20211,10 +19717,8 @@ async def index_apache_hadoop_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -20268,7 +19772,6 @@ async def index_apache_hadoop_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -20317,8 +19820,7 @@ async def index_apache_hadoop_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -20376,10 +19878,8 @@ async def index_apache_hadoop_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -20433,7 +19933,6 @@ async def index_apache_hadoop_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -20482,8 +19981,7 @@ async def index_apache_hadoop_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -20541,10 +20039,8 @@ async def index_apache_hadoop_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -20598,7 +20094,6 @@ async def index_apache_hadoop_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -20643,7 +20138,6 @@ def _index_apache_hadoop_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -20744,10 +20238,6 @@ def _index_apache_hadoop_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -20829,8 +20319,7 @@ async def index_apache_http_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -20888,10 +20377,8 @@ async def index_apache_http_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -20945,7 +20432,6 @@ async def index_apache_http_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -20994,8 +20480,7 @@ async def index_apache_http_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21053,10 +20538,8 @@ async def index_apache_http_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21110,7 +20593,6 @@ async def index_apache_http_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21159,8 +20641,7 @@ async def index_apache_http_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21218,10 +20699,8 @@ async def index_apache_http_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21275,7 +20754,6 @@ async def index_apache_http_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21320,7 +20798,6 @@ def _index_apache_http_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -21421,10 +20898,6 @@ def _index_apache_http_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -21506,8 +20979,7 @@ async def index_apache_jspwiki_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21565,10 +21037,8 @@ async def index_apache_jspwiki_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21622,7 +21092,6 @@ async def index_apache_jspwiki_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21671,8 +21140,7 @@ async def index_apache_jspwiki_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21730,10 +21198,8 @@ async def index_apache_jspwiki_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21787,7 +21253,6 @@ async def index_apache_jspwiki_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21836,8 +21301,7 @@ async def index_apache_jspwiki_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21895,10 +21359,8 @@ async def index_apache_jspwiki_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21952,7 +21414,6 @@ async def index_apache_jspwiki_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21997,7 +21458,6 @@ def _index_apache_jspwiki_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -22098,10 +21558,6 @@ def _index_apache_jspwiki_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -22183,8 +21639,7 @@ async def index_apache_kafka_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -22242,10 +21697,8 @@ async def index_apache_kafka_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -22299,7 +21752,6 @@ async def index_apache_kafka_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -22348,8 +21800,7 @@ async def index_apache_kafka_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -22407,10 +21858,8 @@ async def index_apache_kafka_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -22464,7 +21913,6 @@ async def index_apache_kafka_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -22513,8 +21961,7 @@ async def index_apache_kafka_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -22572,10 +22019,8 @@ async def index_apache_kafka_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -22629,7 +22074,6 @@ async def index_apache_kafka_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -22674,7 +22118,6 @@ def _index_apache_kafka_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -22775,10 +22218,6 @@ def _index_apache_kafka_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -22860,8 +22299,7 @@ async def index_apache_loggingservices_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -22919,10 +22357,8 @@ async def index_apache_loggingservices_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -22976,7 +22412,6 @@ async def index_apache_loggingservices_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23025,8 +22460,7 @@ async def index_apache_loggingservices_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23084,10 +22518,8 @@ async def index_apache_loggingservices_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23141,7 +22573,6 @@ async def index_apache_loggingservices_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23190,8 +22621,7 @@ async def index_apache_loggingservices_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23249,10 +22679,8 @@ async def index_apache_loggingservices_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23306,7 +22734,6 @@ async def index_apache_loggingservices_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23351,7 +22778,6 @@ def _index_apache_loggingservices_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -23452,10 +22878,6 @@ def _index_apache_loggingservices_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -23537,8 +22959,7 @@ async def index_apache_nifi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23596,10 +23017,8 @@ async def index_apache_nifi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23653,7 +23072,6 @@ async def index_apache_nifi_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23702,8 +23120,7 @@ async def index_apache_nifi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23761,10 +23178,8 @@ async def index_apache_nifi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23818,7 +23233,6 @@ async def index_apache_nifi_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23867,8 +23281,7 @@ async def index_apache_nifi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23926,10 +23339,8 @@ async def index_apache_nifi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23983,7 +23394,6 @@ async def index_apache_nifi_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -24028,7 +23438,6 @@ def _index_apache_nifi_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -24129,10 +23538,6 @@ def _index_apache_nifi_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -24214,8 +23619,7 @@ async def index_apache_ofbiz_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -24273,10 +23677,8 @@ async def index_apache_ofbiz_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -24330,7 +23732,6 @@ async def index_apache_ofbiz_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -24379,8 +23780,7 @@ async def index_apache_ofbiz_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -24438,10 +23838,8 @@ async def index_apache_ofbiz_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -24495,7 +23893,6 @@ async def index_apache_ofbiz_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -24544,8 +23941,7 @@ async def index_apache_ofbiz_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -24603,10 +23999,8 @@ async def index_apache_ofbiz_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -24660,7 +24054,6 @@ async def index_apache_ofbiz_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -24705,7 +24098,6 @@ def _index_apache_ofbiz_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -24806,10 +24198,6 @@ def _index_apache_ofbiz_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -24891,8 +24279,7 @@ async def index_apache_openmeetings_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -24950,10 +24337,8 @@ async def index_apache_openmeetings_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25007,7 +24392,6 @@ async def index_apache_openmeetings_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25056,8 +24440,7 @@ async def index_apache_openmeetings_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25115,10 +24498,8 @@ async def index_apache_openmeetings_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25172,7 +24553,6 @@ async def index_apache_openmeetings_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25221,8 +24601,7 @@ async def index_apache_openmeetings_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25280,10 +24659,8 @@ async def index_apache_openmeetings_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25337,7 +24714,6 @@ async def index_apache_openmeetings_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25382,7 +24758,6 @@ def _index_apache_openmeetings_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -25483,10 +24858,6 @@ def _index_apache_openmeetings_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -25568,8 +24939,7 @@ async def index_apache_openoffice_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25627,10 +24997,8 @@ async def index_apache_openoffice_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25684,7 +25052,6 @@ async def index_apache_openoffice_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25733,8 +25100,7 @@ async def index_apache_openoffice_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25792,10 +25158,8 @@ async def index_apache_openoffice_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25849,7 +25213,6 @@ async def index_apache_openoffice_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25898,8 +25261,7 @@ async def index_apache_openoffice_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25957,10 +25319,8 @@ async def index_apache_openoffice_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -26014,7 +25374,6 @@ async def index_apache_openoffice_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -26059,7 +25418,6 @@ def _index_apache_openoffice_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -26160,10 +25518,6 @@ def _index_apache_openoffice_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -26245,8 +25599,7 @@ async def index_apache_pulsar_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -26304,10 +25657,8 @@ async def index_apache_pulsar_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -26361,7 +25712,6 @@ async def index_apache_pulsar_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -26410,8 +25760,7 @@ async def index_apache_pulsar_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -26469,10 +25818,8 @@ async def index_apache_pulsar_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -26526,7 +25873,6 @@ async def index_apache_pulsar_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -26575,8 +25921,7 @@ async def index_apache_pulsar_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -26634,10 +25979,8 @@ async def index_apache_pulsar_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -26691,7 +26034,6 @@ async def index_apache_pulsar_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -26736,7 +26078,6 @@ def _index_apache_pulsar_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -26837,10 +26178,6 @@ def _index_apache_pulsar_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -26922,8 +26259,7 @@ async def index_apache_shiro_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -26981,10 +26317,8 @@ async def index_apache_shiro_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27038,7 +26372,6 @@ async def index_apache_shiro_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27087,8 +26420,7 @@ async def index_apache_shiro_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27146,10 +26478,8 @@ async def index_apache_shiro_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27203,7 +26533,6 @@ async def index_apache_shiro_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27252,8 +26581,7 @@ async def index_apache_shiro_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27311,10 +26639,8 @@ async def index_apache_shiro_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27368,7 +26694,6 @@ async def index_apache_shiro_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27413,7 +26738,6 @@ def _index_apache_shiro_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -27514,10 +26838,6 @@ def _index_apache_shiro_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -27599,8 +26919,7 @@ async def index_apache_spark_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27658,10 +26977,8 @@ async def index_apache_spark_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27715,7 +27032,6 @@ async def index_apache_spark_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27764,8 +27080,7 @@ async def index_apache_spark_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27823,10 +27138,8 @@ async def index_apache_spark_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27880,7 +27193,6 @@ async def index_apache_spark_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27929,8 +27241,7 @@ async def index_apache_spark_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27988,10 +27299,8 @@ async def index_apache_spark_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -28045,7 +27354,6 @@ async def index_apache_spark_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -28090,7 +27398,6 @@ def _index_apache_spark_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -28191,10 +27498,6 @@ def _index_apache_spark_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -28276,8 +27579,7 @@ async def index_apache_struts_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -28335,10 +27637,8 @@ async def index_apache_struts_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -28392,7 +27692,6 @@ async def index_apache_struts_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -28441,8 +27740,7 @@ async def index_apache_struts_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -28500,10 +27798,8 @@ async def index_apache_struts_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -28557,7 +27853,6 @@ async def index_apache_struts_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -28606,8 +27901,7 @@ async def index_apache_struts_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -28665,10 +27959,8 @@ async def index_apache_struts_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -28722,7 +28014,6 @@ async def index_apache_struts_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -28767,7 +28058,6 @@ def _index_apache_struts_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -28868,10 +28158,6 @@ def _index_apache_struts_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -28953,8 +28239,7 @@ async def index_apache_subversion_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29012,10 +28297,8 @@ async def index_apache_subversion_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29069,7 +28352,6 @@ async def index_apache_subversion_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29118,8 +28400,7 @@ async def index_apache_subversion_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29177,10 +28458,8 @@ async def index_apache_subversion_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29234,7 +28513,6 @@ async def index_apache_subversion_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29283,8 +28561,7 @@ async def index_apache_subversion_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29342,10 +28619,8 @@ async def index_apache_subversion_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29399,7 +28674,6 @@ async def index_apache_subversion_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29444,7 +28718,6 @@ def _index_apache_subversion_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -29545,10 +28818,6 @@ def _index_apache_subversion_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -29630,8 +28899,7 @@ async def index_apache_superset_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29689,10 +28957,8 @@ async def index_apache_superset_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29746,7 +29012,6 @@ async def index_apache_superset_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29795,8 +29060,7 @@ async def index_apache_superset_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29854,10 +29118,8 @@ async def index_apache_superset_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29911,7 +29173,6 @@ async def index_apache_superset_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29960,8 +29221,7 @@ async def index_apache_superset_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -30019,10 +29279,8 @@ async def index_apache_superset_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -30076,7 +29334,6 @@ async def index_apache_superset_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -30121,7 +29378,6 @@ def _index_apache_superset_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -30222,10 +29478,6 @@ def _index_apache_superset_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -30307,8 +29559,7 @@ async def index_apache_tomcat_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -30366,10 +29617,8 @@ async def index_apache_tomcat_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -30423,7 +29672,6 @@ async def index_apache_tomcat_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -30472,8 +29720,7 @@ async def index_apache_tomcat_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -30531,10 +29778,8 @@ async def index_apache_tomcat_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -30588,7 +29833,6 @@ async def index_apache_tomcat_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -30637,8 +29881,7 @@ async def index_apache_tomcat_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -30696,10 +29939,8 @@ async def index_apache_tomcat_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -30753,7 +29994,6 @@ async def index_apache_tomcat_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -30798,7 +30038,6 @@ def _index_apache_tomcat_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -30899,10 +30138,6 @@ def _index_apache_tomcat_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -30984,8 +30219,7 @@ async def index_apache_zookeeper_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31043,10 +30277,8 @@ async def index_apache_zookeeper_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31100,7 +30332,6 @@ async def index_apache_zookeeper_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31149,8 +30380,7 @@ async def index_apache_zookeeper_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31208,10 +30438,8 @@ async def index_apache_zookeeper_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31265,7 +30493,6 @@ async def index_apache_zookeeper_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31314,8 +30541,7 @@ async def index_apache_zookeeper_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31373,10 +30599,8 @@ async def index_apache_zookeeper_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31430,7 +30654,6 @@ async def index_apache_zookeeper_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31475,7 +30698,6 @@ def _index_apache_zookeeper_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -31576,10 +30798,6 @@ def _index_apache_zookeeper_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -31661,8 +30879,7 @@ async def index_appcheck_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31720,10 +30937,8 @@ async def index_appcheck_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31777,7 +30992,6 @@ async def index_appcheck_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31826,8 +31040,7 @@ async def index_appcheck_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31885,10 +31098,8 @@ async def index_appcheck_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31942,7 +31153,6 @@ async def index_appcheck_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31991,8 +31201,7 @@ async def index_appcheck_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -32050,10 +31259,8 @@ async def index_appcheck_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -32107,7 +31314,6 @@ async def index_appcheck_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -32152,7 +31358,6 @@ def _index_appcheck_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -32253,10 +31458,6 @@ def _index_appcheck_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -32338,8 +31539,7 @@ async def index_appgate_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -32397,10 +31597,8 @@ async def index_appgate_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -32454,7 +31652,6 @@ async def index_appgate_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -32503,8 +31700,7 @@ async def index_appgate_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -32562,10 +31758,8 @@ async def index_appgate_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -32619,7 +31813,6 @@ async def index_appgate_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -32668,8 +31861,7 @@ async def index_appgate_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -32727,10 +31919,8 @@ async def index_appgate_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -32784,7 +31974,6 @@ async def index_appgate_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -32829,7 +32018,6 @@ def _index_appgate_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -32930,10 +32118,6 @@ def _index_appgate_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -33015,8 +32199,7 @@ async def index_apple_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33074,10 +32257,8 @@ async def index_apple_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33131,7 +32312,6 @@ async def index_apple_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -33180,8 +32360,7 @@ async def index_apple_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33239,10 +32418,8 @@ async def index_apple_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33296,7 +32473,6 @@ async def index_apple_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -33345,8 +32521,7 @@ async def index_apple_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33404,10 +32579,8 @@ async def index_apple_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33461,7 +32634,6 @@ async def index_apple_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -33506,7 +32678,6 @@ def _index_apple_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -33607,10 +32778,6 @@ def _index_apple_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -33692,8 +32859,7 @@ async def index_arch_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33751,10 +32917,8 @@ async def index_arch_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33808,7 +32972,6 @@ async def index_arch_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -33857,8 +33020,7 @@ async def index_arch_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33916,10 +33078,8 @@ async def index_arch_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33973,7 +33133,6 @@ async def index_arch_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34022,8 +33181,7 @@ async def index_arch_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -34081,10 +33239,8 @@ async def index_arch_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -34138,7 +33294,6 @@ async def index_arch_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34183,7 +33338,6 @@ def _index_arch_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -34284,10 +33438,6 @@ def _index_arch_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -34369,8 +33519,7 @@ async def index_arista_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -34428,10 +33577,8 @@ async def index_arista_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -34485,7 +33632,6 @@ async def index_arista_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34534,8 +33680,7 @@ async def index_arista_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -34593,10 +33738,8 @@ async def index_arista_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -34650,7 +33793,6 @@ async def index_arista_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34699,8 +33841,7 @@ async def index_arista_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -34758,10 +33899,8 @@ async def index_arista_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -34815,7 +33954,6 @@ async def index_arista_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34860,7 +33998,6 @@ def _index_arista_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -34961,10 +34098,6 @@ def _index_arista_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -35046,8 +34179,7 @@ async def index_aruba_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35105,10 +34237,8 @@ async def index_aruba_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -35162,7 +34292,6 @@ async def index_aruba_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -35211,8 +34340,7 @@ async def index_aruba_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35270,10 +34398,8 @@ async def index_aruba_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -35327,7 +34453,6 @@ async def index_aruba_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -35376,8 +34501,7 @@ async def index_aruba_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35435,10 +34559,8 @@ async def index_aruba_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -35492,7 +34614,6 @@ async def index_aruba_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -35537,7 +34658,6 @@ def _index_aruba_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -35638,10 +34758,6 @@ def _index_aruba_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -35723,8 +34839,7 @@ async def index_asrg_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35782,10 +34897,8 @@ async def index_asrg_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -35839,7 +34952,6 @@ async def index_asrg_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -35888,8 +35000,7 @@ async def index_asrg_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35947,10 +35058,8 @@ async def index_asrg_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36004,7 +35113,6 @@ async def index_asrg_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36053,8 +35161,7 @@ async def index_asrg_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -36112,10 +35219,8 @@ async def index_asrg_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36169,7 +35274,6 @@ async def index_asrg_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36214,7 +35318,6 @@ def _index_asrg_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -36315,10 +35418,6 @@ def _index_asrg_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -36400,8 +35499,7 @@ async def index_assetnote_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -36459,10 +35557,8 @@ async def index_assetnote_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36516,7 +35612,6 @@ async def index_assetnote_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36565,8 +35660,7 @@ async def index_assetnote_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -36624,10 +35718,8 @@ async def index_assetnote_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36681,7 +35773,6 @@ async def index_assetnote_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36730,8 +35821,7 @@ async def index_assetnote_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -36789,10 +35879,8 @@ async def index_assetnote_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36846,7 +35934,6 @@ async def index_assetnote_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36891,7 +35978,6 @@ def _index_assetnote_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -36992,10 +36078,6 @@ def _index_assetnote_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -37077,8 +36159,7 @@ async def index_asterisk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37136,10 +36217,8 @@ async def index_asterisk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -37193,7 +36272,6 @@ async def index_asterisk_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -37242,8 +36320,7 @@ async def index_asterisk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37301,10 +36378,8 @@ async def index_asterisk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -37358,7 +36433,6 @@ async def index_asterisk_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -37407,8 +36481,7 @@ async def index_asterisk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37466,10 +36539,8 @@ async def index_asterisk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -37523,7 +36594,6 @@ async def index_asterisk_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -37568,7 +36638,6 @@ def _index_asterisk_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -37669,10 +36738,6 @@ def _index_asterisk_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -37754,8 +36819,7 @@ async def index_astra_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37813,10 +36877,8 @@ async def index_astra_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -37870,7 +36932,6 @@ async def index_astra_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -37919,8 +36980,7 @@ async def index_astra_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37978,10 +37038,8 @@ async def index_astra_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38035,7 +37093,6 @@ async def index_astra_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38084,8 +37141,7 @@ async def index_astra_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -38143,10 +37199,8 @@ async def index_astra_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38200,7 +37254,6 @@ async def index_astra_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38245,7 +37298,6 @@ def _index_astra_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -38346,10 +37398,6 @@ def _index_astra_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -38431,8 +37479,7 @@ async def index_asus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -38490,10 +37537,8 @@ async def index_asus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38547,7 +37592,6 @@ async def index_asus_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38596,8 +37640,7 @@ async def index_asus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -38655,10 +37698,8 @@ async def index_asus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38712,7 +37753,6 @@ async def index_asus_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38761,8 +37801,7 @@ async def index_asus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -38820,10 +37859,8 @@ async def index_asus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38877,7 +37914,6 @@ async def index_asus_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38922,7 +37958,6 @@ def _index_asus_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -39023,10 +38058,6 @@ def _index_asus_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -39108,8 +38139,7 @@ async def index_atlassian_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39167,10 +38197,8 @@ async def index_atlassian_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -39224,7 +38252,6 @@ async def index_atlassian_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -39273,8 +38300,7 @@ async def index_atlassian_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39332,10 +38358,8 @@ async def index_atlassian_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -39389,7 +38413,6 @@ async def index_atlassian_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -39438,8 +38461,7 @@ async def index_atlassian_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39497,10 +38519,8 @@ async def index_atlassian_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -39554,7 +38574,6 @@ async def index_atlassian_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -39599,7 +38618,6 @@ def _index_atlassian_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -39700,10 +38718,6 @@ def _index_atlassian_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -39785,8 +38799,7 @@ async def index_atlassian_vulns_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39844,10 +38857,8 @@ async def index_atlassian_vulns_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -39901,7 +38912,6 @@ async def index_atlassian_vulns_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -39950,8 +38960,7 @@ async def index_atlassian_vulns_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40009,10 +39018,8 @@ async def index_atlassian_vulns_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40066,7 +39073,6 @@ async def index_atlassian_vulns_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40115,8 +39121,7 @@ async def index_atlassian_vulns_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40174,10 +39179,8 @@ async def index_atlassian_vulns_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40231,7 +39234,6 @@ async def index_atlassian_vulns_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40276,7 +39278,6 @@ def _index_atlassian_vulns_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -40377,10 +39378,6 @@ def _index_atlassian_vulns_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -40462,8 +39459,7 @@ async def index_atredis_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40521,10 +39517,8 @@ async def index_atredis_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40578,7 +39572,6 @@ async def index_atredis_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40627,8 +39620,7 @@ async def index_atredis_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40686,10 +39678,8 @@ async def index_atredis_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40743,7 +39733,6 @@ async def index_atredis_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40792,8 +39781,7 @@ async def index_atredis_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40851,10 +39839,8 @@ async def index_atredis_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40908,7 +39894,6 @@ async def index_atredis_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40953,7 +39938,6 @@ def _index_atredis_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -41054,10 +40038,6 @@ def _index_atredis_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -41139,8 +40119,7 @@ async def index_audiocodes_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -41198,10 +40177,8 @@ async def index_audiocodes_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -41255,7 +40232,6 @@ async def index_audiocodes_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -41304,8 +40280,7 @@ async def index_audiocodes_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -41363,10 +40338,8 @@ async def index_audiocodes_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -41420,7 +40393,6 @@ async def index_audiocodes_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -41469,8 +40441,7 @@ async def index_audiocodes_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -41528,10 +40499,8 @@ async def index_audiocodes_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -41585,7 +40554,6 @@ async def index_audiocodes_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -41630,7 +40598,6 @@ def _index_audiocodes_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -41731,10 +40698,6 @@ def _index_audiocodes_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -41816,8 +40779,7 @@ async def index_auscert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -41875,10 +40837,8 @@ async def index_auscert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -41932,7 +40892,6 @@ async def index_auscert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -41981,8 +40940,7 @@ async def index_auscert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42040,10 +40998,8 @@ async def index_auscert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42097,7 +41053,6 @@ async def index_auscert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42146,8 +41101,7 @@ async def index_auscert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42205,10 +41159,8 @@ async def index_auscert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42262,7 +41214,6 @@ async def index_auscert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42307,7 +41258,6 @@ def _index_auscert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -42408,10 +41358,6 @@ def _index_auscert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -42493,8 +41439,7 @@ async def index_autodesk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42552,10 +41497,8 @@ async def index_autodesk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42609,7 +41552,6 @@ async def index_autodesk_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42658,8 +41600,7 @@ async def index_autodesk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42717,10 +41658,8 @@ async def index_autodesk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42774,7 +41713,6 @@ async def index_autodesk_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42823,8 +41761,7 @@ async def index_autodesk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42882,10 +41819,8 @@ async def index_autodesk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42939,7 +41874,6 @@ async def index_autodesk_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42984,7 +41918,6 @@ def _index_autodesk_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -43085,10 +42018,6 @@ def _index_autodesk_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -43170,8 +42099,7 @@ async def index_avaya_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -43229,10 +42157,8 @@ async def index_avaya_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -43286,7 +42212,6 @@ async def index_avaya_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -43335,8 +42260,7 @@ async def index_avaya_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -43394,10 +42318,8 @@ async def index_avaya_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -43451,7 +42373,6 @@ async def index_avaya_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -43500,8 +42421,7 @@ async def index_avaya_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -43559,10 +42479,8 @@ async def index_avaya_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -43616,7 +42534,6 @@ async def index_avaya_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -43661,7 +42578,6 @@ def _index_avaya_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -43762,10 +42678,6 @@ def _index_avaya_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -43847,8 +42759,7 @@ async def index_aveva_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -43906,10 +42817,8 @@ async def index_aveva_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -43963,7 +42872,6 @@ async def index_aveva_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44012,8 +42920,7 @@ async def index_aveva_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44071,10 +42978,8 @@ async def index_aveva_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44128,7 +43033,6 @@ async def index_aveva_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44177,8 +43081,7 @@ async def index_aveva_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44236,10 +43139,8 @@ async def index_aveva_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44293,7 +43194,6 @@ async def index_aveva_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44338,7 +43238,6 @@ def _index_aveva_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -44439,10 +43338,6 @@ def _index_aveva_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -44524,8 +43419,7 @@ async def index_avidml_advs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44583,10 +43477,8 @@ async def index_avidml_advs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44640,7 +43532,6 @@ async def index_avidml_advs_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44689,8 +43580,7 @@ async def index_avidml_advs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44748,10 +43638,8 @@ async def index_avidml_advs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44805,7 +43693,6 @@ async def index_avidml_advs_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44854,8 +43741,7 @@ async def index_avidml_advs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44913,10 +43799,8 @@ async def index_avidml_advs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44970,7 +43854,6 @@ async def index_avidml_advs_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -45015,7 +43898,6 @@ def _index_avidml_advs_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -45116,10 +43998,6 @@ def _index_avidml_advs_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -45201,8 +44079,7 @@ async def index_avigilon_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -45260,10 +44137,8 @@ async def index_avigilon_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -45317,7 +44192,6 @@ async def index_avigilon_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -45366,8 +44240,7 @@ async def index_avigilon_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -45425,10 +44298,8 @@ async def index_avigilon_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -45482,7 +44353,6 @@ async def index_avigilon_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -45531,8 +44401,7 @@ async def index_avigilon_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -45590,10 +44459,8 @@ async def index_avigilon_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -45647,7 +44514,6 @@ async def index_avigilon_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -45692,7 +44558,6 @@ def _index_avigilon_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -45793,10 +44658,6 @@ def _index_avigilon_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -45878,8 +44739,7 @@ async def index_aws_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -45937,10 +44797,8 @@ async def index_aws_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -45994,7 +44852,6 @@ async def index_aws_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46043,8 +44900,7 @@ async def index_aws_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46102,10 +44958,8 @@ async def index_aws_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -46159,7 +45013,6 @@ async def index_aws_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46208,8 +45061,7 @@ async def index_aws_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46267,10 +45119,8 @@ async def index_aws_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -46324,7 +45174,6 @@ async def index_aws_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46369,7 +45218,6 @@ def _index_aws_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -46470,10 +45318,6 @@ def _index_aws_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -46555,8 +45399,7 @@ async def index_axis_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46614,10 +45457,8 @@ async def index_axis_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -46671,7 +45512,6 @@ async def index_axis_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46720,8 +45560,7 @@ async def index_axis_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46779,10 +45618,8 @@ async def index_axis_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -46836,7 +45673,6 @@ async def index_axis_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46885,8 +45721,7 @@ async def index_axis_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46944,10 +45779,8 @@ async def index_axis_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -47001,7 +45834,6 @@ async def index_axis_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -47046,7 +45878,6 @@ def _index_axis_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -47147,10 +45978,6 @@ def _index_axis_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -47232,8 +46059,7 @@ async def index_azul_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -47291,10 +46117,8 @@ async def index_azul_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -47348,7 +46172,6 @@ async def index_azul_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -47397,8 +46220,7 @@ async def index_azul_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -47456,10 +46278,8 @@ async def index_azul_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -47513,7 +46333,6 @@ async def index_azul_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -47562,8 +46381,7 @@ async def index_azul_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -47621,10 +46439,8 @@ async def index_azul_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -47678,7 +46494,6 @@ async def index_azul_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -47723,7 +46538,6 @@ def _index_azul_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -47824,10 +46638,6 @@ def _index_azul_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -47909,8 +46719,7 @@ async def index_bandr_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -47968,10 +46777,8 @@ async def index_bandr_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48025,7 +46832,6 @@ async def index_bandr_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48074,8 +46880,7 @@ async def index_bandr_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48133,10 +46938,8 @@ async def index_bandr_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48190,7 +46993,6 @@ async def index_bandr_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48239,8 +47041,7 @@ async def index_bandr_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48298,10 +47099,8 @@ async def index_bandr_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48355,7 +47154,6 @@ async def index_bandr_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48400,7 +47198,6 @@ def _index_bandr_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -48501,10 +47298,6 @@ def _index_bandr_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -48586,8 +47379,7 @@ async def index_baxter_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48645,10 +47437,8 @@ async def index_baxter_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48702,7 +47492,6 @@ async def index_baxter_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48751,8 +47540,7 @@ async def index_baxter_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48810,10 +47598,8 @@ async def index_baxter_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48867,7 +47653,6 @@ async def index_baxter_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48916,8 +47701,7 @@ async def index_baxter_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48975,10 +47759,8 @@ async def index_baxter_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -49032,7 +47814,6 @@ async def index_baxter_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -49077,7 +47858,6 @@ def _index_baxter_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -49178,10 +47958,6 @@ def _index_baxter_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -49263,8 +48039,7 @@ async def index_bbraun_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -49322,10 +48097,8 @@ async def index_bbraun_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -49379,7 +48152,6 @@ async def index_bbraun_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -49428,8 +48200,7 @@ async def index_bbraun_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -49487,10 +48258,8 @@ async def index_bbraun_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -49544,7 +48313,6 @@ async def index_bbraun_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -49593,8 +48361,7 @@ async def index_bbraun_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -49652,10 +48419,8 @@ async def index_bbraun_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -49709,7 +48474,6 @@ async def index_bbraun_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -49754,7 +48518,6 @@ def _index_bbraun_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -49855,10 +48618,6 @@ def _index_bbraun_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -49940,8 +48699,7 @@ async def index_bd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -49999,10 +48757,8 @@ async def index_bd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50056,7 +48812,6 @@ async def index_bd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50105,8 +48860,7 @@ async def index_bd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50164,10 +48918,8 @@ async def index_bd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50221,7 +48973,6 @@ async def index_bd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50270,8 +49021,7 @@ async def index_bd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50329,10 +49079,8 @@ async def index_bd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50386,7 +49134,6 @@ async def index_bd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50431,7 +49178,6 @@ def _index_bd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -50532,10 +49278,6 @@ def _index_bd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -50617,8 +49359,7 @@ async def index_bdu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50676,10 +49417,8 @@ async def index_bdu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50733,7 +49472,6 @@ async def index_bdu_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50782,8 +49520,7 @@ async def index_bdu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50841,10 +49578,8 @@ async def index_bdu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50898,7 +49633,6 @@ async def index_bdu_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50947,8 +49681,7 @@ async def index_bdu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -51006,10 +49739,8 @@ async def index_bdu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -51063,7 +49794,6 @@ async def index_bdu_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -51108,7 +49838,6 @@ def _index_bdu_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -51209,10 +49938,6 @@ def _index_bdu_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -51294,8 +50019,7 @@ async def index_beckhoff_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -51353,10 +50077,8 @@ async def index_beckhoff_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -51410,7 +50132,6 @@ async def index_beckhoff_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -51459,8 +50180,7 @@ async def index_beckhoff_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -51518,10 +50238,8 @@ async def index_beckhoff_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -51575,7 +50293,6 @@ async def index_beckhoff_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -51624,8 +50341,7 @@ async def index_beckhoff_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -51683,10 +50399,8 @@ async def index_beckhoff_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -51740,7 +50454,6 @@ async def index_beckhoff_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -51785,7 +50498,6 @@ def _index_beckhoff_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -51886,10 +50598,6 @@ def _index_beckhoff_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -51971,8 +50679,7 @@ async def index_beckman_coulter_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52030,10 +50737,8 @@ async def index_beckman_coulter_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52087,7 +50792,6 @@ async def index_beckman_coulter_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52136,8 +50840,7 @@ async def index_beckman_coulter_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52195,10 +50898,8 @@ async def index_beckman_coulter_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52252,7 +50953,6 @@ async def index_beckman_coulter_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52301,8 +51001,7 @@ async def index_beckman_coulter_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52360,10 +51059,8 @@ async def index_beckman_coulter_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52417,7 +51114,6 @@ async def index_beckman_coulter_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52462,7 +51158,6 @@ def _index_beckman_coulter_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -52563,10 +51258,6 @@ def _index_beckman_coulter_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -52648,8 +51339,7 @@ async def index_belden_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52707,10 +51397,8 @@ async def index_belden_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52764,7 +51452,6 @@ async def index_belden_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52813,8 +51500,7 @@ async def index_belden_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52872,10 +51558,8 @@ async def index_belden_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52929,7 +51613,6 @@ async def index_belden_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52978,8 +51661,7 @@ async def index_belden_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -53037,10 +51719,8 @@ async def index_belden_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -53094,7 +51774,6 @@ async def index_belden_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -53139,7 +51818,6 @@ def _index_belden_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -53240,10 +51918,6 @@ def _index_belden_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -53325,8 +51999,7 @@ async def index_beyond_trust_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -53384,10 +52057,8 @@ async def index_beyond_trust_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -53441,7 +52112,6 @@ async def index_beyond_trust_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -53490,8 +52160,7 @@ async def index_beyond_trust_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -53549,10 +52218,8 @@ async def index_beyond_trust_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -53606,7 +52273,6 @@ async def index_beyond_trust_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -53655,8 +52321,7 @@ async def index_beyond_trust_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -53714,10 +52379,8 @@ async def index_beyond_trust_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -53771,7 +52434,6 @@ async def index_beyond_trust_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -53816,7 +52478,6 @@ def _index_beyond_trust_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -53917,10 +52578,6 @@ def _index_beyond_trust_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -54002,8 +52659,7 @@ async def index_binarly_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54061,10 +52717,8 @@ async def index_binarly_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54118,7 +52772,6 @@ async def index_binarly_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -54167,8 +52820,7 @@ async def index_binarly_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54226,10 +52878,8 @@ async def index_binarly_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54283,7 +52933,6 @@ async def index_binarly_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -54332,8 +52981,7 @@ async def index_binarly_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54391,10 +53039,8 @@ async def index_binarly_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54448,7 +53094,6 @@ async def index_binarly_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -54493,7 +53138,6 @@ def _index_binarly_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -54594,10 +53238,6 @@ def _index_binarly_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -54679,8 +53319,7 @@ async def index_bitdefender_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54738,10 +53377,8 @@ async def index_bitdefender_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54795,7 +53432,6 @@ async def index_bitdefender_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -54844,8 +53480,7 @@ async def index_bitdefender_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54903,10 +53538,8 @@ async def index_bitdefender_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54960,7 +53593,6 @@ async def index_bitdefender_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55009,8 +53641,7 @@ async def index_bitdefender_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -55068,10 +53699,8 @@ async def index_bitdefender_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -55125,7 +53754,6 @@ async def index_bitdefender_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55170,7 +53798,6 @@ def _index_bitdefender_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -55271,10 +53898,6 @@ def _index_bitdefender_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -55356,8 +53979,7 @@ async def index_blackberry_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -55415,10 +54037,8 @@ async def index_blackberry_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -55472,7 +54092,6 @@ async def index_blackberry_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55521,8 +54140,7 @@ async def index_blackberry_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -55580,10 +54198,8 @@ async def index_blackberry_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -55637,7 +54253,6 @@ async def index_blackberry_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55686,8 +54301,7 @@ async def index_blackberry_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -55745,10 +54359,8 @@ async def index_blackberry_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -55802,7 +54414,6 @@ async def index_blackberry_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55847,7 +54458,6 @@ def _index_blackberry_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -55948,10 +54558,6 @@ def _index_blackberry_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -56033,8 +54639,7 @@ async def index_bls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56092,10 +54697,8 @@ async def index_bls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56149,7 +54752,6 @@ async def index_bls_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -56198,8 +54800,7 @@ async def index_bls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56257,10 +54858,8 @@ async def index_bls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56314,7 +54913,6 @@ async def index_bls_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -56363,8 +54961,7 @@ async def index_bls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56422,10 +55019,8 @@ async def index_bls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56479,7 +55074,6 @@ async def index_bls_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -56524,7 +55118,6 @@ def _index_bls_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -56625,10 +55218,6 @@ def _index_bls_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -56710,8 +55299,7 @@ async def index_bosch_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56769,10 +55357,8 @@ async def index_bosch_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56826,7 +55412,6 @@ async def index_bosch_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -56875,8 +55460,7 @@ async def index_bosch_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56934,10 +55518,8 @@ async def index_bosch_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56991,7 +55573,6 @@ async def index_bosch_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57040,8 +55621,7 @@ async def index_bosch_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -57099,10 +55679,8 @@ async def index_bosch_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -57156,7 +55734,6 @@ async def index_bosch_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57201,7 +55778,6 @@ def _index_bosch_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -57302,10 +55878,6 @@ def _index_bosch_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -57387,8 +55959,7 @@ async def index_boston_scientific_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -57446,10 +56017,8 @@ async def index_boston_scientific_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -57503,7 +56072,6 @@ async def index_boston_scientific_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57552,8 +56120,7 @@ async def index_boston_scientific_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -57611,10 +56178,8 @@ async def index_boston_scientific_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -57668,7 +56233,6 @@ async def index_boston_scientific_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57717,8 +56281,7 @@ async def index_boston_scientific_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -57776,10 +56339,8 @@ async def index_boston_scientific_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -57833,7 +56394,6 @@ async def index_boston_scientific_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57878,7 +56438,6 @@ def _index_boston_scientific_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -57979,10 +56538,6 @@ def _index_boston_scientific_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -58064,8 +56619,7 @@ async def index_botnets_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58123,10 +56677,8 @@ async def index_botnets_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -58180,7 +56732,6 @@ async def index_botnets_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -58229,8 +56780,7 @@ async def index_botnets_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58288,10 +56838,8 @@ async def index_botnets_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -58345,7 +56893,6 @@ async def index_botnets_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -58394,8 +56941,7 @@ async def index_botnets_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58453,10 +56999,8 @@ async def index_botnets_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -58510,7 +57054,6 @@ async def index_botnets_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -58555,7 +57098,6 @@ def _index_botnets_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -58656,10 +57198,6 @@ def _index_botnets_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -58741,8 +57279,7 @@ async def index_ca_cyber_centre_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58800,10 +57337,8 @@ async def index_ca_cyber_centre_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -58857,7 +57392,6 @@ async def index_ca_cyber_centre_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -58906,8 +57440,7 @@ async def index_ca_cyber_centre_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58965,10 +57498,8 @@ async def index_ca_cyber_centre_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59022,7 +57553,6 @@ async def index_ca_cyber_centre_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59071,8 +57601,7 @@ async def index_ca_cyber_centre_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -59130,10 +57659,8 @@ async def index_ca_cyber_centre_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59187,7 +57714,6 @@ async def index_ca_cyber_centre_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59232,7 +57758,6 @@ def _index_ca_cyber_centre_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -59333,10 +57858,6 @@ def _index_ca_cyber_centre_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -59418,8 +57939,7 @@ async def index_canvas_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -59477,10 +57997,8 @@ async def index_canvas_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59534,7 +58052,6 @@ async def index_canvas_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59583,8 +58100,7 @@ async def index_canvas_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -59642,10 +58158,8 @@ async def index_canvas_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59699,7 +58213,6 @@ async def index_canvas_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59748,8 +58261,7 @@ async def index_canvas_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -59807,10 +58319,8 @@ async def index_canvas_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59864,7 +58374,6 @@ async def index_canvas_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59909,7 +58418,6 @@ def _index_canvas_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -60010,10 +58518,6 @@ def _index_canvas_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -60095,8 +58599,7 @@ async def index_carestream_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60154,10 +58657,8 @@ async def index_carestream_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -60211,7 +58712,6 @@ async def index_carestream_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -60260,8 +58760,7 @@ async def index_carestream_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60319,10 +58818,8 @@ async def index_carestream_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -60376,7 +58873,6 @@ async def index_carestream_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -60425,8 +58921,7 @@ async def index_carestream_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60484,10 +58979,8 @@ async def index_carestream_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -60541,7 +59034,6 @@ async def index_carestream_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -60586,7 +59078,6 @@ def _index_carestream_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -60687,10 +59178,6 @@ def _index_carestream_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -60772,8 +59259,7 @@ async def index_cargo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60831,10 +59317,8 @@ async def index_cargo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -60888,7 +59372,6 @@ async def index_cargo_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -60937,8 +59420,7 @@ async def index_cargo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60996,10 +59478,8 @@ async def index_cargo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61053,7 +59533,6 @@ async def index_cargo_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61102,8 +59581,7 @@ async def index_cargo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -61161,10 +59639,8 @@ async def index_cargo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61218,7 +59694,6 @@ async def index_cargo_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61263,7 +59738,6 @@ def _index_cargo_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -61364,10 +59838,6 @@ def _index_cargo_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -61449,8 +59919,7 @@ async def index_carrier_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -61508,10 +59977,8 @@ async def index_carrier_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61565,7 +60032,6 @@ async def index_carrier_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61614,8 +60080,7 @@ async def index_carrier_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -61673,10 +60138,8 @@ async def index_carrier_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61730,7 +60193,6 @@ async def index_carrier_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61779,8 +60241,7 @@ async def index_carrier_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -61838,10 +60299,8 @@ async def index_carrier_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61895,7 +60354,6 @@ async def index_carrier_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61940,7 +60398,6 @@ def _index_carrier_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -62041,10 +60498,6 @@ def _index_carrier_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -62126,8 +60579,7 @@ async def index_cbl_mariner_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62185,10 +60637,8 @@ async def index_cbl_mariner_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -62242,7 +60692,6 @@ async def index_cbl_mariner_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -62291,8 +60740,7 @@ async def index_cbl_mariner_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62350,10 +60798,8 @@ async def index_cbl_mariner_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -62407,7 +60853,6 @@ async def index_cbl_mariner_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -62456,8 +60901,7 @@ async def index_cbl_mariner_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62515,10 +60959,8 @@ async def index_cbl_mariner_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -62572,7 +61014,6 @@ async def index_cbl_mariner_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -62617,7 +61058,6 @@ def _index_cbl_mariner_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -62718,10 +61158,6 @@ def _index_cbl_mariner_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -62803,8 +61239,7 @@ async def index_centos_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62862,10 +61297,8 @@ async def index_centos_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -62919,7 +61352,6 @@ async def index_centos_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -62968,8 +61400,7 @@ async def index_centos_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63027,10 +61458,8 @@ async def index_centos_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63084,7 +61513,6 @@ async def index_centos_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63133,8 +61561,7 @@ async def index_centos_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63192,10 +61619,8 @@ async def index_centos_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63249,7 +61674,6 @@ async def index_centos_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63294,7 +61718,6 @@ def _index_centos_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -63395,10 +61818,6 @@ def _index_centos_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -63480,8 +61899,7 @@ async def index_cert_be_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63539,10 +61957,8 @@ async def index_cert_be_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63596,7 +62012,6 @@ async def index_cert_be_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63645,8 +62060,7 @@ async def index_cert_be_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63704,10 +62118,8 @@ async def index_cert_be_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63761,7 +62173,6 @@ async def index_cert_be_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63810,8 +62221,7 @@ async def index_cert_be_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63869,10 +62279,8 @@ async def index_cert_be_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63926,7 +62334,6 @@ async def index_cert_be_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63971,7 +62378,6 @@ def _index_cert_be_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -64072,10 +62478,6 @@ def _index_cert_be_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -64157,8 +62559,7 @@ async def index_cert_in_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -64216,10 +62617,8 @@ async def index_cert_in_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -64273,7 +62672,6 @@ async def index_cert_in_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -64322,8 +62720,7 @@ async def index_cert_in_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -64381,10 +62778,8 @@ async def index_cert_in_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -64438,7 +62833,6 @@ async def index_cert_in_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -64487,8 +62881,7 @@ async def index_cert_in_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -64546,10 +62939,8 @@ async def index_cert_in_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -64603,7 +62994,6 @@ async def index_cert_in_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -64648,7 +63038,6 @@ def _index_cert_in_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -64749,10 +63138,6 @@ def _index_cert_in_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -64834,8 +63219,7 @@ async def index_cert_ir_security_alerts_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -64893,10 +63277,8 @@ async def index_cert_ir_security_alerts_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -64950,7 +63332,6 @@ async def index_cert_ir_security_alerts_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -64999,8 +63380,7 @@ async def index_cert_ir_security_alerts_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65058,10 +63438,8 @@ async def index_cert_ir_security_alerts_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65115,7 +63493,6 @@ async def index_cert_ir_security_alerts_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -65164,8 +63541,7 @@ async def index_cert_ir_security_alerts_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65223,10 +63599,8 @@ async def index_cert_ir_security_alerts_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65280,7 +63654,6 @@ async def index_cert_ir_security_alerts_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -65325,7 +63698,6 @@ def _index_cert_ir_security_alerts_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -65426,10 +63798,6 @@ def _index_cert_ir_security_alerts_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -65511,8 +63879,7 @@ async def index_cert_se_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65570,10 +63937,8 @@ async def index_cert_se_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65627,7 +63992,6 @@ async def index_cert_se_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -65676,8 +64040,7 @@ async def index_cert_se_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65735,10 +64098,8 @@ async def index_cert_se_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65792,7 +64153,6 @@ async def index_cert_se_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -65841,8 +64201,7 @@ async def index_cert_se_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65900,10 +64259,8 @@ async def index_cert_se_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65957,7 +64314,6 @@ async def index_cert_se_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -66002,7 +64358,6 @@ def _index_cert_se_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -66103,10 +64458,6 @@ def _index_cert_se_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -66188,8 +64539,7 @@ async def index_cert_ua_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -66247,10 +64597,8 @@ async def index_cert_ua_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -66304,7 +64652,6 @@ async def index_cert_ua_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -66353,8 +64700,7 @@ async def index_cert_ua_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -66412,10 +64758,8 @@ async def index_cert_ua_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -66469,7 +64813,6 @@ async def index_cert_ua_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -66518,8 +64861,7 @@ async def index_cert_ua_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -66577,10 +64919,8 @@ async def index_cert_ua_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -66634,7 +64974,6 @@ async def index_cert_ua_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -66679,7 +65018,6 @@ def _index_cert_ua_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -66780,10 +65118,6 @@ def _index_cert_ua_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -66865,8 +65199,7 @@ async def index_certeu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -66924,10 +65257,8 @@ async def index_certeu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -66981,7 +65312,6 @@ async def index_certeu_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67030,8 +65360,7 @@ async def index_certeu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67089,10 +65418,8 @@ async def index_certeu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67146,7 +65473,6 @@ async def index_certeu_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67195,8 +65521,7 @@ async def index_certeu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67254,10 +65579,8 @@ async def index_certeu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67311,7 +65634,6 @@ async def index_certeu_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67356,7 +65678,6 @@ def _index_certeu_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -67457,10 +65778,6 @@ def _index_certeu_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -67542,8 +65859,7 @@ async def index_certfr_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67601,10 +65917,8 @@ async def index_certfr_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67658,7 +65972,6 @@ async def index_certfr_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67707,8 +66020,7 @@ async def index_certfr_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67766,10 +66078,8 @@ async def index_certfr_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67823,7 +66133,6 @@ async def index_certfr_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67872,8 +66181,7 @@ async def index_certfr_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67931,10 +66239,8 @@ async def index_certfr_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67988,7 +66294,6 @@ async def index_certfr_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -68033,7 +66338,6 @@ def _index_certfr_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -68134,10 +66438,6 @@ def _index_certfr_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -68219,8 +66519,7 @@ async def index_chainguard_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -68278,10 +66577,8 @@ async def index_chainguard_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -68335,7 +66632,6 @@ async def index_chainguard_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -68384,8 +66680,7 @@ async def index_chainguard_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -68443,10 +66738,8 @@ async def index_chainguard_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -68500,7 +66793,6 @@ async def index_chainguard_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -68549,8 +66841,7 @@ async def index_chainguard_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -68608,10 +66899,8 @@ async def index_chainguard_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -68665,7 +66954,6 @@ async def index_chainguard_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -68710,7 +66998,6 @@ def _index_chainguard_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -68811,10 +67098,6 @@ def _index_chainguard_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -68896,8 +67179,7 @@ async def index_checkpoint_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -68955,10 +67237,8 @@ async def index_checkpoint_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69012,7 +67292,6 @@ async def index_checkpoint_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69061,8 +67340,7 @@ async def index_checkpoint_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69120,10 +67398,8 @@ async def index_checkpoint_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69177,7 +67453,6 @@ async def index_checkpoint_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69226,8 +67501,7 @@ async def index_checkpoint_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69285,10 +67559,8 @@ async def index_checkpoint_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69342,7 +67614,6 @@ async def index_checkpoint_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69387,7 +67658,6 @@ def _index_checkpoint_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -69488,10 +67758,6 @@ def _index_checkpoint_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -69573,8 +67839,7 @@ async def index_chrome_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69632,10 +67897,8 @@ async def index_chrome_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69689,7 +67952,6 @@ async def index_chrome_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69738,8 +68000,7 @@ async def index_chrome_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69797,10 +68058,8 @@ async def index_chrome_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69854,7 +68113,6 @@ async def index_chrome_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69903,8 +68161,7 @@ async def index_chrome_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69962,10 +68219,8 @@ async def index_chrome_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -70019,7 +68274,6 @@ async def index_chrome_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -70064,7 +68318,6 @@ def _index_chrome_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -70165,10 +68418,6 @@ def _index_chrome_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -70250,8 +68499,7 @@ async def index_ciena_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -70309,10 +68557,8 @@ async def index_ciena_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -70366,7 +68612,6 @@ async def index_ciena_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -70415,8 +68660,7 @@ async def index_ciena_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -70474,10 +68718,8 @@ async def index_ciena_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -70531,7 +68773,6 @@ async def index_ciena_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -70580,8 +68821,7 @@ async def index_ciena_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -70639,10 +68879,8 @@ async def index_ciena_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -70696,7 +68934,6 @@ async def index_ciena_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -70741,7 +68978,6 @@ def _index_ciena_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -70842,10 +69078,6 @@ def _index_ciena_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -70927,8 +69159,7 @@ async def index_cisa_alerts_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -70986,10 +69217,8 @@ async def index_cisa_alerts_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71043,7 +69272,6 @@ async def index_cisa_alerts_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71092,8 +69320,7 @@ async def index_cisa_alerts_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71151,10 +69378,8 @@ async def index_cisa_alerts_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71208,7 +69433,6 @@ async def index_cisa_alerts_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71257,8 +69481,7 @@ async def index_cisa_alerts_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71316,10 +69539,8 @@ async def index_cisa_alerts_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71373,7 +69594,6 @@ async def index_cisa_alerts_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71418,7 +69638,6 @@ def _index_cisa_alerts_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -71519,10 +69738,6 @@ def _index_cisa_alerts_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -71604,8 +69819,7 @@ async def index_cisa_csaf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71663,10 +69877,8 @@ async def index_cisa_csaf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71720,7 +69932,6 @@ async def index_cisa_csaf_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71769,8 +69980,7 @@ async def index_cisa_csaf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71828,10 +70038,8 @@ async def index_cisa_csaf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71885,7 +70093,6 @@ async def index_cisa_csaf_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71934,8 +70141,7 @@ async def index_cisa_csaf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71993,10 +70199,8 @@ async def index_cisa_csaf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -72050,7 +70254,6 @@ async def index_cisa_csaf_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -72095,7 +70298,6 @@ def _index_cisa_csaf_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -72196,10 +70398,6 @@ def _index_cisa_csaf_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -72281,8 +70479,7 @@ async def index_cisa_kev_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -72340,10 +70537,8 @@ async def index_cisa_kev_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -72397,7 +70592,6 @@ async def index_cisa_kev_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -72446,8 +70640,7 @@ async def index_cisa_kev_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -72505,10 +70698,8 @@ async def index_cisa_kev_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -72562,7 +70753,6 @@ async def index_cisa_kev_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -72611,8 +70801,7 @@ async def index_cisa_kev_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -72670,10 +70859,8 @@ async def index_cisa_kev_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -72727,7 +70914,6 @@ async def index_cisa_kev_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -72772,7 +70958,6 @@ def _index_cisa_kev_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -72873,10 +71058,6 @@ def _index_cisa_kev_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -72958,8 +71139,7 @@ async def index_cisco_csaf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73017,10 +71197,8 @@ async def index_cisco_csaf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73074,7 +71252,6 @@ async def index_cisco_csaf_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73123,8 +71300,7 @@ async def index_cisco_csaf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73182,10 +71358,8 @@ async def index_cisco_csaf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73239,7 +71413,6 @@ async def index_cisco_csaf_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73288,8 +71461,7 @@ async def index_cisco_csaf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73347,10 +71519,8 @@ async def index_cisco_csaf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73404,7 +71574,6 @@ async def index_cisco_csaf_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73449,7 +71618,6 @@ def _index_cisco_csaf_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -73550,10 +71718,6 @@ def _index_cisco_csaf_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -73635,8 +71799,7 @@ async def index_cisco_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73694,10 +71857,8 @@ async def index_cisco_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73751,7 +71912,6 @@ async def index_cisco_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73800,8 +71960,7 @@ async def index_cisco_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73859,10 +72018,8 @@ async def index_cisco_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73916,7 +72073,6 @@ async def index_cisco_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73965,8 +72121,7 @@ async def index_cisco_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -74024,10 +72179,8 @@ async def index_cisco_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -74081,7 +72234,6 @@ async def index_cisco_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -74126,7 +72278,6 @@ def _index_cisco_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -74227,10 +72378,6 @@ def _index_cisco_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -74312,8 +72459,7 @@ async def index_cisco_known_good_values_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -74371,10 +72517,8 @@ async def index_cisco_known_good_values_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -74428,7 +72572,6 @@ async def index_cisco_known_good_values_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -74477,8 +72620,7 @@ async def index_cisco_known_good_values_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -74536,10 +72678,8 @@ async def index_cisco_known_good_values_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -74593,7 +72733,6 @@ async def index_cisco_known_good_values_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -74642,8 +72781,7 @@ async def index_cisco_known_good_values_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -74701,10 +72839,8 @@ async def index_cisco_known_good_values_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -74758,7 +72894,6 @@ async def index_cisco_known_good_values_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -74803,7 +72938,6 @@ def _index_cisco_known_good_values_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -74904,10 +73038,6 @@ def _index_cisco_known_good_values_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -74989,8 +73119,7 @@ async def index_cisco_talos_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75048,10 +73177,8 @@ async def index_cisco_talos_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75105,7 +73232,6 @@ async def index_cisco_talos_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75154,8 +73280,7 @@ async def index_cisco_talos_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75213,10 +73338,8 @@ async def index_cisco_talos_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75270,7 +73393,6 @@ async def index_cisco_talos_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75319,8 +73441,7 @@ async def index_cisco_talos_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75378,10 +73499,8 @@ async def index_cisco_talos_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75435,7 +73554,6 @@ async def index_cisco_talos_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75480,7 +73598,6 @@ def _index_cisco_talos_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -75581,10 +73698,6 @@ def _index_cisco_talos_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -75666,8 +73779,7 @@ async def index_citrix_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75725,10 +73837,8 @@ async def index_citrix_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75782,7 +73892,6 @@ async def index_citrix_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75831,8 +73940,7 @@ async def index_citrix_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75890,10 +73998,8 @@ async def index_citrix_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75947,7 +74053,6 @@ async def index_citrix_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75996,8 +74101,7 @@ async def index_citrix_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -76055,10 +74159,8 @@ async def index_citrix_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -76112,7 +74214,6 @@ async def index_citrix_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -76157,7 +74258,6 @@ def _index_citrix_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -76258,10 +74358,6 @@ def _index_citrix_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -76343,8 +74439,7 @@ async def index_claroty_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -76402,10 +74497,8 @@ async def index_claroty_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -76459,7 +74552,6 @@ async def index_claroty_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -76508,8 +74600,7 @@ async def index_claroty_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -76567,10 +74658,8 @@ async def index_claroty_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -76624,7 +74713,6 @@ async def index_claroty_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -76673,8 +74761,7 @@ async def index_claroty_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -76732,10 +74819,8 @@ async def index_claroty_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -76789,7 +74874,6 @@ async def index_claroty_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -76834,7 +74918,6 @@ def _index_claroty_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -76935,10 +75018,6 @@ def _index_claroty_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -77020,8 +75099,7 @@ async def index_cloudbees_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77079,10 +75157,8 @@ async def index_cloudbees_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77136,7 +75212,6 @@ async def index_cloudbees_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -77185,8 +75260,7 @@ async def index_cloudbees_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77244,10 +75318,8 @@ async def index_cloudbees_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77301,7 +75373,6 @@ async def index_cloudbees_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -77350,8 +75421,7 @@ async def index_cloudbees_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77409,10 +75479,8 @@ async def index_cloudbees_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77466,7 +75534,6 @@ async def index_cloudbees_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -77511,7 +75578,6 @@ def _index_cloudbees_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -77612,10 +75678,6 @@ def _index_cloudbees_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -77697,8 +75759,7 @@ async def index_cloudvulndb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77756,10 +75817,8 @@ async def index_cloudvulndb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77813,7 +75872,6 @@ async def index_cloudvulndb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -77862,8 +75920,7 @@ async def index_cloudvulndb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77921,10 +75978,8 @@ async def index_cloudvulndb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77978,7 +76033,6 @@ async def index_cloudvulndb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78027,8 +76081,7 @@ async def index_cloudvulndb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -78086,10 +76139,8 @@ async def index_cloudvulndb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -78143,7 +76194,6 @@ async def index_cloudvulndb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78188,7 +76238,6 @@ def _index_cloudvulndb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -78289,10 +76338,6 @@ def _index_cloudvulndb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -78374,8 +76419,7 @@ async def index_cnnvd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -78433,10 +76477,8 @@ async def index_cnnvd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -78490,7 +76532,6 @@ async def index_cnnvd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78539,8 +76580,7 @@ async def index_cnnvd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -78598,10 +76638,8 @@ async def index_cnnvd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -78655,7 +76693,6 @@ async def index_cnnvd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78704,8 +76741,7 @@ async def index_cnnvd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -78763,10 +76799,8 @@ async def index_cnnvd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -78820,7 +76854,6 @@ async def index_cnnvd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78865,7 +76898,6 @@ def _index_cnnvd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -78966,10 +76998,6 @@ def _index_cnnvd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -79051,8 +77079,7 @@ async def index_cnvd_bulletins_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79110,10 +77137,8 @@ async def index_cnvd_bulletins_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -79167,7 +77192,6 @@ async def index_cnvd_bulletins_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -79216,8 +77240,7 @@ async def index_cnvd_bulletins_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79275,10 +77298,8 @@ async def index_cnvd_bulletins_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -79332,7 +77353,6 @@ async def index_cnvd_bulletins_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -79381,8 +77401,7 @@ async def index_cnvd_bulletins_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79440,10 +77459,8 @@ async def index_cnvd_bulletins_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -79497,7 +77514,6 @@ async def index_cnvd_bulletins_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -79542,7 +77558,6 @@ def _index_cnvd_bulletins_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -79643,10 +77658,6 @@ def _index_cnvd_bulletins_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -79728,8 +77739,7 @@ async def index_cnvd_flaws_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79787,10 +77797,8 @@ async def index_cnvd_flaws_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -79844,7 +77852,6 @@ async def index_cnvd_flaws_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -79893,8 +77900,7 @@ async def index_cnvd_flaws_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79952,10 +77958,8 @@ async def index_cnvd_flaws_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80009,7 +78013,6 @@ async def index_cnvd_flaws_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80058,8 +78061,7 @@ async def index_cnvd_flaws_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -80117,10 +78119,8 @@ async def index_cnvd_flaws_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80174,7 +78174,6 @@ async def index_cnvd_flaws_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80219,7 +78218,6 @@ def _index_cnvd_flaws_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -80320,10 +78318,6 @@ def _index_cnvd_flaws_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -80405,8 +78399,7 @@ async def index_cocoapods_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -80464,10 +78457,8 @@ async def index_cocoapods_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80521,7 +78512,6 @@ async def index_cocoapods_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80570,8 +78560,7 @@ async def index_cocoapods_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -80629,10 +78618,8 @@ async def index_cocoapods_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80686,7 +78673,6 @@ async def index_cocoapods_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80735,8 +78721,7 @@ async def index_cocoapods_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -80794,10 +78779,8 @@ async def index_cocoapods_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80851,7 +78834,6 @@ async def index_cocoapods_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80896,7 +78878,6 @@ def _index_cocoapods_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -80997,10 +78978,6 @@ def _index_cocoapods_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -81082,8 +79059,7 @@ async def index_codesys_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81141,10 +79117,8 @@ async def index_codesys_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -81198,7 +79172,6 @@ async def index_codesys_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -81247,8 +79220,7 @@ async def index_codesys_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81306,10 +79278,8 @@ async def index_codesys_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -81363,7 +79333,6 @@ async def index_codesys_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -81412,8 +79381,7 @@ async def index_codesys_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81471,10 +79439,8 @@ async def index_codesys_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -81528,7 +79494,6 @@ async def index_codesys_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -81573,7 +79538,6 @@ def _index_codesys_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -81674,10 +79638,6 @@ def _index_codesys_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -81759,8 +79719,7 @@ async def index_commvault_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81818,10 +79777,8 @@ async def index_commvault_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -81875,7 +79832,6 @@ async def index_commvault_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -81924,8 +79880,7 @@ async def index_commvault_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81983,10 +79938,8 @@ async def index_commvault_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82040,7 +79993,6 @@ async def index_commvault_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82089,8 +80041,7 @@ async def index_commvault_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -82148,10 +80099,8 @@ async def index_commvault_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82205,7 +80154,6 @@ async def index_commvault_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82250,7 +80198,6 @@ def _index_commvault_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -82351,10 +80298,6 @@ def _index_commvault_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -82436,8 +80379,7 @@ async def index_compass_security_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -82495,10 +80437,8 @@ async def index_compass_security_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82552,7 +80492,6 @@ async def index_compass_security_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82601,8 +80540,7 @@ async def index_compass_security_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -82660,10 +80598,8 @@ async def index_compass_security_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82717,7 +80653,6 @@ async def index_compass_security_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82766,8 +80701,7 @@ async def index_compass_security_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -82825,10 +80759,8 @@ async def index_compass_security_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82882,7 +80814,6 @@ async def index_compass_security_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82927,7 +80858,6 @@ def _index_compass_security_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -83028,10 +80958,6 @@ def _index_compass_security_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -83113,8 +81039,7 @@ async def index_composer_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83172,10 +81097,8 @@ async def index_composer_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -83229,7 +81152,6 @@ async def index_composer_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -83278,8 +81200,7 @@ async def index_composer_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83337,10 +81258,8 @@ async def index_composer_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -83394,7 +81313,6 @@ async def index_composer_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -83443,8 +81361,7 @@ async def index_composer_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83502,10 +81419,8 @@ async def index_composer_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -83559,7 +81474,6 @@ async def index_composer_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -83604,7 +81518,6 @@ def _index_composer_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -83705,10 +81618,6 @@ def _index_composer_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -83790,8 +81699,7 @@ async def index_conan_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83849,10 +81757,8 @@ async def index_conan_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -83906,7 +81812,6 @@ async def index_conan_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -83955,8 +81860,7 @@ async def index_conan_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84014,10 +81918,8 @@ async def index_conan_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84071,7 +81973,6 @@ async def index_conan_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84120,8 +82021,7 @@ async def index_conan_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84179,10 +82079,8 @@ async def index_conan_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84236,7 +82134,6 @@ async def index_conan_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84281,7 +82178,6 @@ def _index_conan_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -84382,10 +82278,6 @@ def _index_conan_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -84467,8 +82359,7 @@ async def index_coreimpact_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84526,10 +82417,8 @@ async def index_coreimpact_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84583,7 +82472,6 @@ async def index_coreimpact_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84632,8 +82520,7 @@ async def index_coreimpact_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84691,10 +82578,8 @@ async def index_coreimpact_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84748,7 +82633,6 @@ async def index_coreimpact_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84797,8 +82681,7 @@ async def index_coreimpact_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84856,10 +82739,8 @@ async def index_coreimpact_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84913,7 +82794,6 @@ async def index_coreimpact_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84958,7 +82838,6 @@ def _index_coreimpact_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -85059,10 +82938,6 @@ def _index_coreimpact_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -85144,8 +83019,7 @@ async def index_cpe_vulnerable_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -85203,10 +83077,8 @@ async def index_cpe_vulnerable_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -85260,7 +83132,6 @@ async def index_cpe_vulnerable_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -85309,8 +83180,7 @@ async def index_cpe_vulnerable_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -85368,10 +83238,8 @@ async def index_cpe_vulnerable_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -85425,7 +83293,6 @@ async def index_cpe_vulnerable_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -85474,8 +83341,7 @@ async def index_cpe_vulnerable_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -85533,10 +83399,8 @@ async def index_cpe_vulnerable_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -85590,7 +83454,6 @@ async def index_cpe_vulnerable_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -85635,7 +83498,6 @@ def _index_cpe_vulnerable_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -85736,10 +83598,6 @@ def _index_cpe_vulnerable_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -85821,8 +83679,7 @@ async def index_crestron_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -85880,10 +83737,8 @@ async def index_crestron_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -85937,7 +83792,6 @@ async def index_crestron_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -85986,8 +83840,7 @@ async def index_crestron_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86045,10 +83898,8 @@ async def index_crestron_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86102,7 +83953,6 @@ async def index_crestron_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86151,8 +84001,7 @@ async def index_crestron_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86210,10 +84059,8 @@ async def index_crestron_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86267,7 +84114,6 @@ async def index_crestron_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86312,7 +84158,6 @@ def _index_crestron_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -86413,10 +84258,6 @@ def _index_crestron_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -86498,8 +84339,7 @@ async def index_crowdsec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86557,10 +84397,8 @@ async def index_crowdsec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86614,7 +84452,6 @@ async def index_crowdsec_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86663,8 +84500,7 @@ async def index_crowdsec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86722,10 +84558,8 @@ async def index_crowdsec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86779,7 +84613,6 @@ async def index_crowdsec_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86828,8 +84661,7 @@ async def index_crowdsec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86887,10 +84719,8 @@ async def index_crowdsec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86944,7 +84774,6 @@ async def index_crowdsec_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86989,7 +84818,6 @@ def _index_crowdsec_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -87090,10 +84918,6 @@ def _index_crowdsec_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -87175,8 +84999,7 @@ async def index_curl_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -87234,10 +85057,8 @@ async def index_curl_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -87291,7 +85112,6 @@ async def index_curl_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -87340,8 +85160,7 @@ async def index_curl_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -87399,10 +85218,8 @@ async def index_curl_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -87456,7 +85273,6 @@ async def index_curl_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -87505,8 +85321,7 @@ async def index_curl_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -87564,10 +85379,8 @@ async def index_curl_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -87621,7 +85434,6 @@ async def index_curl_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -87666,7 +85478,6 @@ def _index_curl_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -87767,10 +85578,6 @@ def _index_curl_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -87852,8 +85659,7 @@ async def index_cwe_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -87911,10 +85717,8 @@ async def index_cwe_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -87968,7 +85772,6 @@ async def index_cwe_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88017,8 +85820,7 @@ async def index_cwe_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88076,10 +85878,8 @@ async def index_cwe_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88133,7 +85933,6 @@ async def index_cwe_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88182,8 +85981,7 @@ async def index_cwe_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88241,10 +86039,8 @@ async def index_cwe_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88298,7 +86094,6 @@ async def index_cwe_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88343,7 +86138,6 @@ def _index_cwe_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -88444,10 +86238,6 @@ def _index_cwe_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -88529,8 +86319,7 @@ async def index_dahua_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88588,10 +86377,8 @@ async def index_dahua_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88645,7 +86432,6 @@ async def index_dahua_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88694,8 +86480,7 @@ async def index_dahua_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88753,10 +86538,8 @@ async def index_dahua_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88810,7 +86593,6 @@ async def index_dahua_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88859,8 +86641,7 @@ async def index_dahua_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88918,10 +86699,8 @@ async def index_dahua_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88975,7 +86754,6 @@ async def index_dahua_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -89020,7 +86798,6 @@ def _index_dahua_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -89121,10 +86898,6 @@ def _index_dahua_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -89206,8 +86979,7 @@ async def index_danfoss_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -89265,10 +87037,8 @@ async def index_danfoss_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -89322,7 +87092,6 @@ async def index_danfoss_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -89371,8 +87140,7 @@ async def index_danfoss_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -89430,10 +87198,8 @@ async def index_danfoss_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -89487,7 +87253,6 @@ async def index_danfoss_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -89536,8 +87301,7 @@ async def index_danfoss_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -89595,10 +87359,8 @@ async def index_danfoss_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -89652,7 +87414,6 @@ async def index_danfoss_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -89697,7 +87458,6 @@ def _index_danfoss_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -89798,10 +87558,6 @@ def _index_danfoss_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -89883,8 +87639,7 @@ async def index_dassault_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -89942,10 +87697,8 @@ async def index_dassault_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -89999,7 +87752,6 @@ async def index_dassault_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90048,8 +87800,7 @@ async def index_dassault_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90107,10 +87858,8 @@ async def index_dassault_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -90164,7 +87913,6 @@ async def index_dassault_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90213,8 +87961,7 @@ async def index_dassault_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90272,10 +88019,8 @@ async def index_dassault_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -90329,7 +88074,6 @@ async def index_dassault_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90374,7 +88118,6 @@ def _index_dassault_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -90475,10 +88218,6 @@ def _index_dassault_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -90560,8 +88299,7 @@ async def index_debian_dsa_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90619,10 +88357,8 @@ async def index_debian_dsa_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -90676,7 +88412,6 @@ async def index_debian_dsa_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90725,8 +88460,7 @@ async def index_debian_dsa_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90784,10 +88518,8 @@ async def index_debian_dsa_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -90841,7 +88573,6 @@ async def index_debian_dsa_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90890,8 +88621,7 @@ async def index_debian_dsa_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90949,10 +88679,8 @@ async def index_debian_dsa_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -91006,7 +88734,6 @@ async def index_debian_dsa_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -91051,7 +88778,6 @@ def _index_debian_dsa_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -91152,10 +88878,6 @@ def _index_debian_dsa_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -91237,8 +88959,7 @@ async def index_debian_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -91296,10 +89017,8 @@ async def index_debian_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -91353,7 +89072,6 @@ async def index_debian_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -91402,8 +89120,7 @@ async def index_debian_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -91461,10 +89178,8 @@ async def index_debian_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -91518,7 +89233,6 @@ async def index_debian_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -91567,8 +89281,7 @@ async def index_debian_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -91626,10 +89339,8 @@ async def index_debian_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -91683,7 +89394,6 @@ async def index_debian_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -91728,7 +89438,6 @@ def _index_debian_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -91829,10 +89538,6 @@ def _index_debian_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -91914,8 +89619,7 @@ async def index_debian_packages_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -91973,10 +89677,8 @@ async def index_debian_packages_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92030,7 +89732,6 @@ async def index_debian_packages_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92079,8 +89780,7 @@ async def index_debian_packages_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92138,10 +89838,8 @@ async def index_debian_packages_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92195,7 +89893,6 @@ async def index_debian_packages_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92244,8 +89941,7 @@ async def index_debian_packages_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92303,10 +89999,8 @@ async def index_debian_packages_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92360,7 +90054,6 @@ async def index_debian_packages_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92405,7 +90098,6 @@ def _index_debian_packages_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -92506,10 +90198,6 @@ def _index_debian_packages_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -92591,8 +90279,7 @@ async def index_debian_purls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92650,10 +90337,8 @@ async def index_debian_purls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92707,7 +90392,6 @@ async def index_debian_purls_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92756,8 +90440,7 @@ async def index_debian_purls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92815,10 +90498,8 @@ async def index_debian_purls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92872,7 +90553,6 @@ async def index_debian_purls_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92921,8 +90601,7 @@ async def index_debian_purls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92980,10 +90659,8 @@ async def index_debian_purls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -93037,7 +90714,6 @@ async def index_debian_purls_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -93082,7 +90758,6 @@ def _index_debian_purls_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -93183,10 +90858,6 @@ def _index_debian_purls_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -93268,8 +90939,7 @@ async def index_dell_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -93327,10 +90997,8 @@ async def index_dell_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -93384,7 +91052,6 @@ async def index_dell_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -93433,8 +91100,7 @@ async def index_dell_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -93492,10 +91158,8 @@ async def index_dell_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -93549,7 +91213,6 @@ async def index_dell_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -93598,8 +91261,7 @@ async def index_dell_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -93657,10 +91319,8 @@ async def index_dell_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -93714,7 +91374,6 @@ async def index_dell_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -93759,7 +91418,6 @@ def _index_dell_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -93860,10 +91518,6 @@ def _index_dell_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -93945,8 +91599,7 @@ async def index_delta_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94004,10 +91657,8 @@ async def index_delta_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94061,7 +91712,6 @@ async def index_delta_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94110,8 +91760,7 @@ async def index_delta_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94169,10 +91818,8 @@ async def index_delta_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94226,7 +91873,6 @@ async def index_delta_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94275,8 +91921,7 @@ async def index_delta_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94334,10 +91979,8 @@ async def index_delta_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94391,7 +92034,6 @@ async def index_delta_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94436,7 +92078,6 @@ def _index_delta_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -94537,10 +92178,6 @@ def _index_delta_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -94622,8 +92259,7 @@ async def index_dfn_cert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94681,10 +92317,8 @@ async def index_dfn_cert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94738,7 +92372,6 @@ async def index_dfn_cert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94787,8 +92420,7 @@ async def index_dfn_cert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94846,10 +92478,8 @@ async def index_dfn_cert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94903,7 +92533,6 @@ async def index_dfn_cert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94952,8 +92581,7 @@ async def index_dfn_cert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -95011,10 +92639,8 @@ async def index_dfn_cert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -95068,7 +92694,6 @@ async def index_dfn_cert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -95113,7 +92738,6 @@ def _index_dfn_cert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -95214,10 +92838,6 @@ def _index_dfn_cert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -95299,8 +92919,7 @@ async def index_django_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -95358,10 +92977,8 @@ async def index_django_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -95415,7 +93032,6 @@ async def index_django_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -95464,8 +93080,7 @@ async def index_django_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -95523,10 +93138,8 @@ async def index_django_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -95580,7 +93193,6 @@ async def index_django_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -95629,8 +93241,7 @@ async def index_django_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -95688,10 +93299,8 @@ async def index_django_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -95745,7 +93354,6 @@ async def index_django_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -95790,7 +93398,6 @@ def _index_django_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -95891,10 +93498,6 @@ def _index_django_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -95976,8 +93579,7 @@ async def index_dlink_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96035,10 +93637,8 @@ async def index_dlink_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96092,7 +93692,6 @@ async def index_dlink_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96141,8 +93740,7 @@ async def index_dlink_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96200,10 +93798,8 @@ async def index_dlink_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96257,7 +93853,6 @@ async def index_dlink_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96306,8 +93901,7 @@ async def index_dlink_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96365,10 +93959,8 @@ async def index_dlink_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96422,7 +94014,6 @@ async def index_dlink_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96467,7 +94058,6 @@ def _index_dlink_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -96568,10 +94158,6 @@ def _index_dlink_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -96653,8 +94239,7 @@ async def index_dnn_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96712,10 +94297,8 @@ async def index_dnn_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96769,7 +94352,6 @@ async def index_dnn_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96818,8 +94400,7 @@ async def index_dnn_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96877,10 +94458,8 @@ async def index_dnn_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96934,7 +94513,6 @@ async def index_dnn_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96983,8 +94561,7 @@ async def index_dnn_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -97042,10 +94619,8 @@ async def index_dnn_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -97099,7 +94674,6 @@ async def index_dnn_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -97144,7 +94718,6 @@ def _index_dnn_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -97245,10 +94818,6 @@ def _index_dnn_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -97330,8 +94899,7 @@ async def index_dotcms_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -97389,10 +94957,8 @@ async def index_dotcms_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -97446,7 +95012,6 @@ async def index_dotcms_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -97495,8 +95060,7 @@ async def index_dotcms_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -97554,10 +95118,8 @@ async def index_dotcms_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -97611,7 +95173,6 @@ async def index_dotcms_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -97660,8 +95221,7 @@ async def index_dotcms_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -97719,10 +95279,8 @@ async def index_dotcms_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -97776,7 +95334,6 @@ async def index_dotcms_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -97821,7 +95378,6 @@ def _index_dotcms_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -97922,10 +95478,6 @@ def _index_dotcms_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -98007,8 +95559,7 @@ async def index_dragos_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98066,10 +95617,8 @@ async def index_dragos_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98123,7 +95672,6 @@ async def index_dragos_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -98172,8 +95720,7 @@ async def index_dragos_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98231,10 +95778,8 @@ async def index_dragos_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98288,7 +95833,6 @@ async def index_dragos_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -98337,8 +95881,7 @@ async def index_dragos_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98396,10 +95939,8 @@ async def index_dragos_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98453,7 +95994,6 @@ async def index_dragos_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -98498,7 +96038,6 @@ def _index_dragos_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -98599,10 +96138,6 @@ def _index_dragos_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -98684,8 +96219,7 @@ async def index_draytek_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98743,10 +96277,8 @@ async def index_draytek_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98800,7 +96332,6 @@ async def index_draytek_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -98849,8 +96380,7 @@ async def index_draytek_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98908,10 +96438,8 @@ async def index_draytek_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98965,7 +96493,6 @@ async def index_draytek_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99014,8 +96541,7 @@ async def index_draytek_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -99073,10 +96599,8 @@ async def index_draytek_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -99130,7 +96654,6 @@ async def index_draytek_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99175,7 +96698,6 @@ def _index_draytek_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -99276,10 +96798,6 @@ def _index_draytek_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -99361,8 +96879,7 @@ async def index_drupal_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -99420,10 +96937,8 @@ async def index_drupal_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -99477,7 +96992,6 @@ async def index_drupal_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99526,8 +97040,7 @@ async def index_drupal_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -99585,10 +97098,8 @@ async def index_drupal_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -99642,7 +97153,6 @@ async def index_drupal_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99691,8 +97201,7 @@ async def index_drupal_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -99750,10 +97259,8 @@ async def index_drupal_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -99807,7 +97314,6 @@ async def index_drupal_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99852,7 +97358,6 @@ def _index_drupal_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -99953,10 +97458,6 @@ def _index_drupal_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -100038,8 +97539,7 @@ async def index_eaton_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100097,10 +97597,8 @@ async def index_eaton_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100154,7 +97652,6 @@ async def index_eaton_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -100203,8 +97700,7 @@ async def index_eaton_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100262,10 +97758,8 @@ async def index_eaton_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100319,7 +97813,6 @@ async def index_eaton_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -100368,8 +97861,7 @@ async def index_eaton_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100427,10 +97919,8 @@ async def index_eaton_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100484,7 +97974,6 @@ async def index_eaton_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -100529,7 +98018,6 @@ def _index_eaton_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -100630,10 +98118,6 @@ def _index_eaton_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -100715,8 +98199,7 @@ async def index_elastic_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100774,10 +98257,8 @@ async def index_elastic_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100831,7 +98312,6 @@ async def index_elastic_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -100880,8 +98360,7 @@ async def index_elastic_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100939,10 +98418,8 @@ async def index_elastic_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100996,7 +98473,6 @@ async def index_elastic_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101045,8 +98521,7 @@ async def index_elastic_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -101104,10 +98579,8 @@ async def index_elastic_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -101161,7 +98634,6 @@ async def index_elastic_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101206,7 +98678,6 @@ def _index_elastic_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -101307,10 +98778,6 @@ def _index_elastic_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -101392,8 +98859,7 @@ async def index_elspec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -101451,10 +98917,8 @@ async def index_elspec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -101508,7 +98972,6 @@ async def index_elspec_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101557,8 +99020,7 @@ async def index_elspec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -101616,10 +99078,8 @@ async def index_elspec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -101673,7 +99133,6 @@ async def index_elspec_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101722,8 +99181,7 @@ async def index_elspec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -101781,10 +99239,8 @@ async def index_elspec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -101838,7 +99294,6 @@ async def index_elspec_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101883,7 +99338,6 @@ def _index_elspec_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -101984,10 +99438,6 @@ def _index_elspec_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -102069,8 +99519,7 @@ async def index_emerging_threats_snort_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102128,10 +99577,8 @@ async def index_emerging_threats_snort_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -102185,7 +99632,6 @@ async def index_emerging_threats_snort_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -102234,8 +99680,7 @@ async def index_emerging_threats_snort_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102293,10 +99738,8 @@ async def index_emerging_threats_snort_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -102350,7 +99793,6 @@ async def index_emerging_threats_snort_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -102399,8 +99841,7 @@ async def index_emerging_threats_snort_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102458,10 +99899,8 @@ async def index_emerging_threats_snort_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -102515,7 +99954,6 @@ async def index_emerging_threats_snort_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -102560,7 +99998,6 @@ def _index_emerging_threats_snort_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -102661,10 +100098,6 @@ def _index_emerging_threats_snort_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -102746,8 +100179,7 @@ async def index_emerson_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102805,10 +100237,8 @@ async def index_emerson_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -102862,7 +100292,6 @@ async def index_emerson_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -102911,8 +100340,7 @@ async def index_emerson_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102970,10 +100398,8 @@ async def index_emerson_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103027,7 +100453,6 @@ async def index_emerson_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103076,8 +100501,7 @@ async def index_emerson_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -103135,10 +100559,8 @@ async def index_emerson_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103192,7 +100614,6 @@ async def index_emerson_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103237,7 +100658,6 @@ def _index_emerson_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -103338,10 +100758,6 @@ def _index_emerson_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -103423,8 +100839,7 @@ async def index_endoflife_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -103482,10 +100897,8 @@ async def index_endoflife_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103539,7 +100952,6 @@ async def index_endoflife_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103588,8 +101000,7 @@ async def index_endoflife_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -103647,10 +101058,8 @@ async def index_endoflife_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103704,7 +101113,6 @@ async def index_endoflife_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103753,8 +101161,7 @@ async def index_endoflife_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -103812,10 +101219,8 @@ async def index_endoflife_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103869,7 +101274,6 @@ async def index_endoflife_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103914,7 +101318,6 @@ def _index_endoflife_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -104015,10 +101418,6 @@ def _index_endoflife_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -104100,8 +101499,7 @@ async def index_endress_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104159,10 +101557,8 @@ async def index_endress_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -104216,7 +101612,6 @@ async def index_endress_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -104265,8 +101660,7 @@ async def index_endress_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104324,10 +101718,8 @@ async def index_endress_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -104381,7 +101773,6 @@ async def index_endress_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -104430,8 +101821,7 @@ async def index_endress_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104489,10 +101879,8 @@ async def index_endress_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -104546,7 +101934,6 @@ async def index_endress_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -104591,7 +101978,6 @@ def _index_endress_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -104692,10 +102078,6 @@ def _index_endress_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -104777,8 +102159,7 @@ async def index_eol_alibaba_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104836,10 +102217,8 @@ async def index_eol_alibaba_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -104893,7 +102272,6 @@ async def index_eol_alibaba_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -104942,8 +102320,7 @@ async def index_eol_alibaba_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105001,10 +102378,8 @@ async def index_eol_alibaba_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105058,7 +102433,6 @@ async def index_eol_alibaba_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105107,8 +102481,7 @@ async def index_eol_alibaba_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105166,10 +102539,8 @@ async def index_eol_alibaba_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105223,7 +102594,6 @@ async def index_eol_alibaba_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105268,7 +102638,6 @@ def _index_eol_alibaba_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -105369,10 +102738,6 @@ def _index_eol_alibaba_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -105454,8 +102819,7 @@ async def index_eol_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105513,10 +102877,8 @@ async def index_eol_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105570,7 +102932,6 @@ async def index_eol_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105619,8 +102980,7 @@ async def index_eol_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105678,10 +103038,8 @@ async def index_eol_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105735,7 +103093,6 @@ async def index_eol_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105784,8 +103141,7 @@ async def index_eol_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105843,10 +103199,8 @@ async def index_eol_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105900,7 +103254,6 @@ async def index_eol_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105945,7 +103298,6 @@ def _index_eol_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -106046,10 +103398,6 @@ def _index_eol_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -106131,8 +103479,7 @@ async def index_eol_microsoft_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106190,10 +103537,8 @@ async def index_eol_microsoft_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -106247,7 +103592,6 @@ async def index_eol_microsoft_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -106296,8 +103640,7 @@ async def index_eol_microsoft_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106355,10 +103698,8 @@ async def index_eol_microsoft_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -106412,7 +103753,6 @@ async def index_eol_microsoft_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -106461,8 +103801,7 @@ async def index_eol_microsoft_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106520,10 +103859,8 @@ async def index_eol_microsoft_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -106577,7 +103914,6 @@ async def index_eol_microsoft_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -106622,7 +103958,6 @@ def _index_eol_microsoft_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -106723,10 +104058,6 @@ def _index_eol_microsoft_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -106808,8 +104139,7 @@ async def index_epss_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106867,10 +104197,8 @@ async def index_epss_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -106924,7 +104252,6 @@ async def index_epss_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -106973,8 +104300,7 @@ async def index_epss_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107032,10 +104358,8 @@ async def index_epss_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107089,7 +104413,6 @@ async def index_epss_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107138,8 +104461,7 @@ async def index_epss_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107197,10 +104519,8 @@ async def index_epss_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107254,7 +104574,6 @@ async def index_epss_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107299,7 +104618,6 @@ def _index_epss_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -107400,10 +104718,6 @@ def _index_epss_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -107485,8 +104799,7 @@ async def index_euvd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107544,10 +104857,8 @@ async def index_euvd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107601,7 +104912,6 @@ async def index_euvd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107650,8 +104960,7 @@ async def index_euvd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107709,10 +105018,8 @@ async def index_euvd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107766,7 +105073,6 @@ async def index_euvd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107815,8 +105121,7 @@ async def index_euvd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107874,10 +105179,8 @@ async def index_euvd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107931,7 +105234,6 @@ async def index_euvd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107976,7 +105278,6 @@ def _index_euvd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -108077,10 +105378,6 @@ def _index_euvd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -108162,8 +105459,7 @@ async def index_exodus_intel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -108221,10 +105517,8 @@ async def index_exodus_intel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -108278,7 +105572,6 @@ async def index_exodus_intel_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -108327,8 +105620,7 @@ async def index_exodus_intel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -108386,10 +105678,8 @@ async def index_exodus_intel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -108443,7 +105733,6 @@ async def index_exodus_intel_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -108492,8 +105781,7 @@ async def index_exodus_intel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -108551,10 +105839,8 @@ async def index_exodus_intel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -108608,7 +105894,6 @@ async def index_exodus_intel_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -108653,7 +105938,6 @@ def _index_exodus_intel_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -108754,10 +106038,6 @@ def _index_exodus_intel_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -108839,8 +106119,7 @@ async def index_exploit_chains_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -108898,10 +106177,8 @@ async def index_exploit_chains_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -108955,7 +106232,6 @@ async def index_exploit_chains_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109004,8 +106280,7 @@ async def index_exploit_chains_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109063,10 +106338,8 @@ async def index_exploit_chains_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109120,7 +106393,6 @@ async def index_exploit_chains_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109169,8 +106441,7 @@ async def index_exploit_chains_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109228,10 +106499,8 @@ async def index_exploit_chains_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109285,7 +106554,6 @@ async def index_exploit_chains_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109330,7 +106598,6 @@ def _index_exploit_chains_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -109431,10 +106698,6 @@ def _index_exploit_chains_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -109516,8 +106779,7 @@ async def index_exploitdb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109575,10 +106837,8 @@ async def index_exploitdb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109632,7 +106892,6 @@ async def index_exploitdb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109681,8 +106940,7 @@ async def index_exploitdb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109740,10 +106998,8 @@ async def index_exploitdb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109797,7 +107053,6 @@ async def index_exploitdb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109846,8 +107101,7 @@ async def index_exploitdb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109905,10 +107159,8 @@ async def index_exploitdb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109962,7 +107214,6 @@ async def index_exploitdb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -110007,7 +107258,6 @@ def _index_exploitdb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -110108,10 +107358,6 @@ def _index_exploitdb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -110193,8 +107439,7 @@ async def index_exploits_changelog_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -110252,10 +107497,8 @@ async def index_exploits_changelog_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -110309,7 +107552,6 @@ async def index_exploits_changelog_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -110358,8 +107600,7 @@ async def index_exploits_changelog_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -110417,10 +107658,8 @@ async def index_exploits_changelog_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -110474,7 +107713,6 @@ async def index_exploits_changelog_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -110523,8 +107761,7 @@ async def index_exploits_changelog_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -110582,10 +107819,8 @@ async def index_exploits_changelog_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -110639,7 +107874,6 @@ async def index_exploits_changelog_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -110684,7 +107918,6 @@ def _index_exploits_changelog_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -110785,10 +108018,6 @@ def _index_exploits_changelog_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -110870,8 +108099,7 @@ async def index_exploits_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -110929,10 +108157,8 @@ async def index_exploits_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -110986,7 +108212,6 @@ async def index_exploits_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111035,8 +108260,7 @@ async def index_exploits_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111094,10 +108318,8 @@ async def index_exploits_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111151,7 +108373,6 @@ async def index_exploits_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111200,8 +108421,7 @@ async def index_exploits_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111259,10 +108479,8 @@ async def index_exploits_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111316,7 +108534,6 @@ async def index_exploits_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111361,7 +108578,6 @@ def _index_exploits_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -111462,10 +108678,6 @@ def _index_exploits_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -111547,8 +108759,7 @@ async def index_f5_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111606,10 +108817,8 @@ async def index_f5_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111663,7 +108872,6 @@ async def index_f5_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111712,8 +108920,7 @@ async def index_f5_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111771,10 +108978,8 @@ async def index_f5_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111828,7 +109033,6 @@ async def index_f5_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111877,8 +109081,7 @@ async def index_f5_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111936,10 +109139,8 @@ async def index_f5_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111993,7 +109194,6 @@ async def index_f5_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -112038,7 +109238,6 @@ def _index_f5_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -112139,10 +109338,6 @@ def _index_f5_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -112224,8 +109419,7 @@ async def index_f_secure_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -112283,10 +109477,8 @@ async def index_f_secure_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -112340,7 +109532,6 @@ async def index_f_secure_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -112389,8 +109580,7 @@ async def index_f_secure_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -112448,10 +109638,8 @@ async def index_f_secure_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -112505,7 +109693,6 @@ async def index_f_secure_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -112554,8 +109741,7 @@ async def index_f_secure_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -112613,10 +109799,8 @@ async def index_f_secure_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -112670,7 +109854,6 @@ async def index_f_secure_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -112715,7 +109898,6 @@ def _index_f_secure_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -112816,10 +109998,6 @@ def _index_f_secure_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -112901,8 +110079,7 @@ async def index_fanuc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -112960,10 +110137,8 @@ async def index_fanuc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113017,7 +110192,6 @@ async def index_fanuc_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113066,8 +110240,7 @@ async def index_fanuc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113125,10 +110298,8 @@ async def index_fanuc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113182,7 +110353,6 @@ async def index_fanuc_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113231,8 +110401,7 @@ async def index_fanuc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113290,10 +110459,8 @@ async def index_fanuc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113347,7 +110514,6 @@ async def index_fanuc_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113392,7 +110558,6 @@ def _index_fanuc_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -113493,10 +110658,6 @@ def _index_fanuc_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -113578,8 +110739,7 @@ async def index_fastly_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113637,10 +110797,8 @@ async def index_fastly_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113694,7 +110852,6 @@ async def index_fastly_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113743,8 +110900,7 @@ async def index_fastly_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113802,10 +110958,8 @@ async def index_fastly_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113859,7 +111013,6 @@ async def index_fastly_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113908,8 +111061,7 @@ async def index_fastly_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113967,10 +111119,8 @@ async def index_fastly_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -114024,7 +111174,6 @@ async def index_fastly_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -114069,7 +111218,6 @@ def _index_fastly_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -114170,10 +111318,6 @@ def _index_fastly_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -114255,8 +111399,7 @@ async def index_fedora_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -114314,10 +111457,8 @@ async def index_fedora_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -114371,7 +111512,6 @@ async def index_fedora_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -114420,8 +111560,7 @@ async def index_fedora_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -114479,10 +111618,8 @@ async def index_fedora_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -114536,7 +111673,6 @@ async def index_fedora_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -114585,8 +111721,7 @@ async def index_fedora_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -114644,10 +111779,8 @@ async def index_fedora_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -114701,7 +111834,6 @@ async def index_fedora_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -114746,7 +111878,6 @@ def _index_fedora_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -114847,10 +111978,6 @@ def _index_fedora_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -114932,8 +112059,7 @@ async def index_festo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -114991,10 +112117,8 @@ async def index_festo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115048,7 +112172,6 @@ async def index_festo_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115097,8 +112220,7 @@ async def index_festo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115156,10 +112278,8 @@ async def index_festo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115213,7 +112333,6 @@ async def index_festo_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115262,8 +112381,7 @@ async def index_festo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115321,10 +112439,8 @@ async def index_festo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115378,7 +112494,6 @@ async def index_festo_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115423,7 +112538,6 @@ def _index_festo_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -115524,10 +112638,6 @@ def _index_festo_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -115609,8 +112719,7 @@ async def index_filecloud_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115668,10 +112777,8 @@ async def index_filecloud_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115725,7 +112832,6 @@ async def index_filecloud_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115774,8 +112880,7 @@ async def index_filecloud_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115833,10 +112938,8 @@ async def index_filecloud_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115890,7 +112993,6 @@ async def index_filecloud_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115939,8 +113041,7 @@ async def index_filecloud_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115998,10 +113099,8 @@ async def index_filecloud_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -116055,7 +113154,6 @@ async def index_filecloud_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -116100,7 +113198,6 @@ def _index_filecloud_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -116201,10 +113298,6 @@ def _index_filecloud_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -116286,8 +113379,7 @@ async def index_filezilla_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -116345,10 +113437,8 @@ async def index_filezilla_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -116402,7 +113492,6 @@ async def index_filezilla_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -116451,8 +113540,7 @@ async def index_filezilla_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -116510,10 +113598,8 @@ async def index_filezilla_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -116567,7 +113653,6 @@ async def index_filezilla_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -116616,8 +113701,7 @@ async def index_filezilla_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -116675,10 +113759,8 @@ async def index_filezilla_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -116732,7 +113814,6 @@ async def index_filezilla_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -116777,7 +113858,6 @@ def _index_filezilla_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -116878,10 +113958,6 @@ def _index_filezilla_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -116963,8 +114039,7 @@ async def index_flatt_security_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117022,10 +114097,8 @@ async def index_flatt_security_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117079,7 +114152,6 @@ async def index_flatt_security_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117128,8 +114200,7 @@ async def index_flatt_security_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117187,10 +114258,8 @@ async def index_flatt_security_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117244,7 +114313,6 @@ async def index_flatt_security_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117293,8 +114361,7 @@ async def index_flatt_security_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117352,10 +114419,8 @@ async def index_flatt_security_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117409,7 +114474,6 @@ async def index_flatt_security_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117454,7 +114518,6 @@ def _index_flatt_security_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -117555,10 +114618,6 @@ def _index_flatt_security_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -117640,8 +114699,7 @@ async def index_forgerock_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117699,10 +114757,8 @@ async def index_forgerock_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117756,7 +114812,6 @@ async def index_forgerock_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117805,8 +114860,7 @@ async def index_forgerock_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117864,10 +114918,8 @@ async def index_forgerock_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117921,7 +114973,6 @@ async def index_forgerock_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117970,8 +115021,7 @@ async def index_forgerock_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -118029,10 +115079,8 @@ async def index_forgerock_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -118086,7 +115134,6 @@ async def index_forgerock_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -118131,7 +115178,6 @@ def _index_forgerock_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -118232,10 +115278,6 @@ def _index_forgerock_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -118317,8 +115359,7 @@ async def index_fortinet_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -118376,10 +115417,8 @@ async def index_fortinet_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -118433,7 +115472,6 @@ async def index_fortinet_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -118482,8 +115520,7 @@ async def index_fortinet_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -118541,10 +115578,8 @@ async def index_fortinet_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -118598,7 +115633,6 @@ async def index_fortinet_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -118647,8 +115681,7 @@ async def index_fortinet_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -118706,10 +115739,8 @@ async def index_fortinet_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -118763,7 +115794,6 @@ async def index_fortinet_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -118808,7 +115838,6 @@ def _index_fortinet_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -118909,10 +115938,6 @@ def _index_fortinet_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -118994,8 +116019,7 @@ async def index_fortinet_ips_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119053,10 +116077,8 @@ async def index_fortinet_ips_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119110,7 +116132,6 @@ async def index_fortinet_ips_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -119159,8 +116180,7 @@ async def index_fortinet_ips_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119218,10 +116238,8 @@ async def index_fortinet_ips_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119275,7 +116293,6 @@ async def index_fortinet_ips_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -119324,8 +116341,7 @@ async def index_fortinet_ips_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119383,10 +116399,8 @@ async def index_fortinet_ips_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119440,7 +116454,6 @@ async def index_fortinet_ips_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -119485,7 +116498,6 @@ def _index_fortinet_ips_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -119586,10 +116598,6 @@ def _index_fortinet_ips_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -119671,8 +116679,7 @@ async def index_foxit_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119730,10 +116737,8 @@ async def index_foxit_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119787,7 +116792,6 @@ async def index_foxit_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -119836,8 +116840,7 @@ async def index_foxit_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119895,10 +116898,8 @@ async def index_foxit_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119952,7 +116953,6 @@ async def index_foxit_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120001,8 +117001,7 @@ async def index_foxit_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -120060,10 +117059,8 @@ async def index_foxit_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -120117,7 +117114,6 @@ async def index_foxit_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120162,7 +117158,6 @@ def _index_foxit_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -120263,10 +117258,6 @@ def _index_foxit_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -120348,8 +117339,7 @@ async def index_freebsd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -120407,10 +117397,8 @@ async def index_freebsd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -120464,7 +117452,6 @@ async def index_freebsd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120513,8 +117500,7 @@ async def index_freebsd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -120572,10 +117558,8 @@ async def index_freebsd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -120629,7 +117613,6 @@ async def index_freebsd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120678,8 +117661,7 @@ async def index_freebsd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -120737,10 +117719,8 @@ async def index_freebsd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -120794,7 +117774,6 @@ async def index_freebsd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120839,7 +117818,6 @@ def _index_freebsd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -120940,10 +117918,6 @@ def _index_freebsd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -121025,8 +117999,7 @@ async def index_fresenius_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121084,10 +118057,8 @@ async def index_fresenius_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121141,7 +118112,6 @@ async def index_fresenius_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -121190,8 +118160,7 @@ async def index_fresenius_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121249,10 +118218,8 @@ async def index_fresenius_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121306,7 +118273,6 @@ async def index_fresenius_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -121355,8 +118321,7 @@ async def index_fresenius_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121414,10 +118379,8 @@ async def index_fresenius_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121471,7 +118434,6 @@ async def index_fresenius_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -121516,7 +118478,6 @@ def _index_fresenius_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -121617,10 +118578,6 @@ def _index_fresenius_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -121702,8 +118659,7 @@ async def index_gallagher_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121761,10 +118717,8 @@ async def index_gallagher_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121818,7 +118772,6 @@ async def index_gallagher_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -121867,8 +118820,7 @@ async def index_gallagher_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121926,10 +118878,8 @@ async def index_gallagher_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121983,7 +118933,6 @@ async def index_gallagher_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122032,8 +118981,7 @@ async def index_gallagher_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -122091,10 +119039,8 @@ async def index_gallagher_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -122148,7 +119094,6 @@ async def index_gallagher_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122193,7 +119138,6 @@ def _index_gallagher_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -122294,10 +119238,6 @@ def _index_gallagher_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -122379,8 +119319,7 @@ async def index_gcp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -122438,10 +119377,8 @@ async def index_gcp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -122495,7 +119432,6 @@ async def index_gcp_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122544,8 +119480,7 @@ async def index_gcp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -122603,10 +119538,8 @@ async def index_gcp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -122660,7 +119593,6 @@ async def index_gcp_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122709,8 +119641,7 @@ async def index_gcp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -122768,10 +119699,8 @@ async def index_gcp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -122825,7 +119754,6 @@ async def index_gcp_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122870,7 +119798,6 @@ def _index_gcp_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -122971,10 +119898,6 @@ def _index_gcp_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -123056,8 +119979,7 @@ async def index_ge_gas_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123115,10 +120037,8 @@ async def index_ge_gas_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -123172,7 +120092,6 @@ async def index_ge_gas_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -123221,8 +120140,7 @@ async def index_ge_gas_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123280,10 +120198,8 @@ async def index_ge_gas_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -123337,7 +120253,6 @@ async def index_ge_gas_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -123386,8 +120301,7 @@ async def index_ge_gas_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123445,10 +120359,8 @@ async def index_ge_gas_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -123502,7 +120414,6 @@ async def index_ge_gas_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -123547,7 +120458,6 @@ def _index_ge_gas_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -123648,10 +120558,6 @@ def _index_ge_gas_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -123733,8 +120639,7 @@ async def index_ge_healthcare_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123792,10 +120697,8 @@ async def index_ge_healthcare_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -123849,7 +120752,6 @@ async def index_ge_healthcare_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -123898,8 +120800,7 @@ async def index_ge_healthcare_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123957,10 +120858,8 @@ async def index_ge_healthcare_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124014,7 +120913,6 @@ async def index_ge_healthcare_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124063,8 +120961,7 @@ async def index_ge_healthcare_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -124122,10 +121019,8 @@ async def index_ge_healthcare_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124179,7 +121074,6 @@ async def index_ge_healthcare_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124224,7 +121118,6 @@ def _index_ge_healthcare_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -124325,10 +121218,6 @@ def _index_ge_healthcare_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -124410,8 +121299,7 @@ async def index_gem_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -124469,10 +121357,8 @@ async def index_gem_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124526,7 +121412,6 @@ async def index_gem_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124575,8 +121460,7 @@ async def index_gem_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -124634,10 +121518,8 @@ async def index_gem_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124691,7 +121573,6 @@ async def index_gem_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124740,8 +121621,7 @@ async def index_gem_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -124799,10 +121679,8 @@ async def index_gem_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124856,7 +121734,6 @@ async def index_gem_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124901,7 +121778,6 @@ def _index_gem_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -125002,10 +121878,6 @@ def _index_gem_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -125087,8 +121959,7 @@ async def index_gen_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125146,10 +122017,8 @@ async def index_gen_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -125203,7 +122072,6 @@ async def index_gen_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -125252,8 +122120,7 @@ async def index_gen_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125311,10 +122178,8 @@ async def index_gen_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -125368,7 +122233,6 @@ async def index_gen_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -125417,8 +122281,7 @@ async def index_gen_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125476,10 +122339,8 @@ async def index_gen_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -125533,7 +122394,6 @@ async def index_gen_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -125578,7 +122438,6 @@ def _index_gen_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -125679,10 +122538,6 @@ def _index_gen_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -125764,8 +122619,7 @@ async def index_genetec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125823,10 +122677,8 @@ async def index_genetec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -125880,7 +122732,6 @@ async def index_genetec_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -125929,8 +122780,7 @@ async def index_genetec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125988,10 +122838,8 @@ async def index_genetec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126045,7 +122893,6 @@ async def index_genetec_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126094,8 +122941,7 @@ async def index_genetec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -126153,10 +122999,8 @@ async def index_genetec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126210,7 +123054,6 @@ async def index_genetec_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126255,7 +123098,6 @@ def _index_genetec_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -126356,10 +123198,6 @@ def _index_genetec_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -126441,8 +123279,7 @@ async def index_ghsa_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -126500,10 +123337,8 @@ async def index_ghsa_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126557,7 +123392,6 @@ async def index_ghsa_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126606,8 +123440,7 @@ async def index_ghsa_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -126665,10 +123498,8 @@ async def index_ghsa_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126722,7 +123553,6 @@ async def index_ghsa_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126771,8 +123601,7 @@ async def index_ghsa_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -126830,10 +123659,8 @@ async def index_ghsa_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126887,7 +123714,6 @@ async def index_ghsa_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126932,7 +123758,6 @@ def _index_ghsa_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -127033,10 +123858,6 @@ def _index_ghsa_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -127118,8 +123939,7 @@ async def index_gigabyte_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127177,10 +123997,8 @@ async def index_gigabyte_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -127234,7 +124052,6 @@ async def index_gigabyte_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -127283,8 +124100,7 @@ async def index_gigabyte_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127342,10 +124158,8 @@ async def index_gigabyte_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -127399,7 +124213,6 @@ async def index_gigabyte_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -127448,8 +124261,7 @@ async def index_gigabyte_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127507,10 +124319,8 @@ async def index_gigabyte_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -127564,7 +124374,6 @@ async def index_gigabyte_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -127609,7 +124418,6 @@ def _index_gigabyte_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -127710,10 +124518,6 @@ def _index_gigabyte_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -127795,8 +124599,7 @@ async def index_gitee_exploits_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127854,10 +124657,8 @@ async def index_gitee_exploits_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -127911,7 +124712,6 @@ async def index_gitee_exploits_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -127960,8 +124760,7 @@ async def index_gitee_exploits_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128019,10 +124818,8 @@ async def index_gitee_exploits_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128076,7 +124873,6 @@ async def index_gitee_exploits_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128125,8 +124921,7 @@ async def index_gitee_exploits_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128184,10 +124979,8 @@ async def index_gitee_exploits_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128241,7 +125034,6 @@ async def index_gitee_exploits_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128286,7 +125078,6 @@ def _index_gitee_exploits_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -128387,10 +125178,6 @@ def _index_gitee_exploits_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -128472,8 +125259,7 @@ async def index_github_exploits_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128531,10 +125317,8 @@ async def index_github_exploits_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128588,7 +125372,6 @@ async def index_github_exploits_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128637,8 +125420,7 @@ async def index_github_exploits_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128696,10 +125478,8 @@ async def index_github_exploits_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128753,7 +125533,6 @@ async def index_github_exploits_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128802,8 +125581,7 @@ async def index_github_exploits_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128861,10 +125639,8 @@ async def index_github_exploits_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128918,7 +125694,6 @@ async def index_github_exploits_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128963,7 +125738,6 @@ def _index_github_exploits_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -129064,10 +125838,6 @@ def _index_github_exploits_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -129149,8 +125919,7 @@ async def index_github_security_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -129208,10 +125977,8 @@ async def index_github_security_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -129265,7 +126032,6 @@ async def index_github_security_advisories_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -129314,8 +126080,7 @@ async def index_github_security_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -129373,10 +126138,8 @@ async def index_github_security_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -129430,7 +126193,6 @@ async def index_github_security_advisories_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -129479,8 +126241,7 @@ async def index_github_security_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -129538,10 +126299,8 @@ async def index_github_security_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -129595,7 +126354,6 @@ async def index_github_security_advisories_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -129640,7 +126398,6 @@ def _index_github_security_advisories_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -129741,10 +126498,6 @@ def _index_github_security_advisories_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -129826,8 +126579,7 @@ async def index_gitlab_advisories_community_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -129885,10 +126637,8 @@ async def index_gitlab_advisories_community_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -129942,7 +126692,6 @@ async def index_gitlab_advisories_community_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -129991,8 +126740,7 @@ async def index_gitlab_advisories_community_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130050,10 +126798,8 @@ async def index_gitlab_advisories_community_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130107,7 +126853,6 @@ async def index_gitlab_advisories_community_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130156,8 +126901,7 @@ async def index_gitlab_advisories_community_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130215,10 +126959,8 @@ async def index_gitlab_advisories_community_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130272,7 +127014,6 @@ async def index_gitlab_advisories_community_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130317,7 +127058,6 @@ def _index_gitlab_advisories_community_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -130418,10 +127158,6 @@ def _index_gitlab_advisories_community_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -130503,8 +127239,7 @@ async def index_gitlab_exploits_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130562,10 +127297,8 @@ async def index_gitlab_exploits_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130619,7 +127352,6 @@ async def index_gitlab_exploits_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130668,8 +127400,7 @@ async def index_gitlab_exploits_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130727,10 +127458,8 @@ async def index_gitlab_exploits_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130784,7 +127513,6 @@ async def index_gitlab_exploits_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130833,8 +127561,7 @@ async def index_gitlab_exploits_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130892,10 +127619,8 @@ async def index_gitlab_exploits_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130949,7 +127674,6 @@ async def index_gitlab_exploits_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130994,7 +127718,6 @@ def _index_gitlab_exploits_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -131095,10 +127818,6 @@ def _index_gitlab_exploits_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -131180,8 +127899,7 @@ async def index_glibc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -131239,10 +127957,8 @@ async def index_glibc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -131296,7 +128012,6 @@ async def index_glibc_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -131345,8 +128060,7 @@ async def index_glibc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -131404,10 +128118,8 @@ async def index_glibc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -131461,7 +128173,6 @@ async def index_glibc_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -131510,8 +128221,7 @@ async def index_glibc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -131569,10 +128279,8 @@ async def index_glibc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -131626,7 +128334,6 @@ async def index_glibc_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -131671,7 +128378,6 @@ def _index_glibc_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -131772,10 +128478,6 @@ def _index_glibc_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -131857,8 +128559,7 @@ async def index_gmo_cybersecurity_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -131916,10 +128617,8 @@ async def index_gmo_cybersecurity_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -131973,7 +128672,6 @@ async def index_gmo_cybersecurity_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132022,8 +128720,7 @@ async def index_gmo_cybersecurity_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132081,10 +128778,8 @@ async def index_gmo_cybersecurity_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132138,7 +128833,6 @@ async def index_gmo_cybersecurity_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132187,8 +128881,7 @@ async def index_gmo_cybersecurity_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132246,10 +128939,8 @@ async def index_gmo_cybersecurity_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132303,7 +128994,6 @@ async def index_gmo_cybersecurity_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132348,7 +129038,6 @@ def _index_gmo_cybersecurity_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -132449,10 +129138,6 @@ def _index_gmo_cybersecurity_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -132534,8 +129219,7 @@ async def index_gnutls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132593,10 +129277,8 @@ async def index_gnutls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132650,7 +129332,6 @@ async def index_gnutls_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132699,8 +129380,7 @@ async def index_gnutls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132758,10 +129438,8 @@ async def index_gnutls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132815,7 +129493,6 @@ async def index_gnutls_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132864,8 +129541,7 @@ async def index_gnutls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132923,10 +129599,8 @@ async def index_gnutls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132980,7 +129654,6 @@ async def index_gnutls_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -133025,7 +129698,6 @@ def _index_gnutls_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -133126,10 +129798,6 @@ def _index_gnutls_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -133211,8 +129879,7 @@ async def index_go_vulndb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -133270,10 +129937,8 @@ async def index_go_vulndb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -133327,7 +129992,6 @@ async def index_go_vulndb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -133376,8 +130040,7 @@ async def index_go_vulndb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -133435,10 +130098,8 @@ async def index_go_vulndb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -133492,7 +130153,6 @@ async def index_go_vulndb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -133541,8 +130201,7 @@ async def index_go_vulndb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -133600,10 +130259,8 @@ async def index_go_vulndb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -133657,7 +130314,6 @@ async def index_go_vulndb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -133702,7 +130358,6 @@ def _index_go_vulndb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -133803,10 +130458,6 @@ def _index_go_vulndb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -133888,8 +130539,7 @@ async def index_golang_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -133947,10 +130597,8 @@ async def index_golang_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134004,7 +130652,6 @@ async def index_golang_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134053,8 +130700,7 @@ async def index_golang_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134112,10 +130758,8 @@ async def index_golang_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134169,7 +130813,6 @@ async def index_golang_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134218,8 +130861,7 @@ async def index_golang_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134277,10 +130919,8 @@ async def index_golang_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134334,7 +130974,6 @@ async def index_golang_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134379,7 +131018,6 @@ def _index_golang_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -134480,10 +131118,6 @@ def _index_golang_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -134565,8 +131199,7 @@ async def index_google0day_itw_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134624,10 +131257,8 @@ async def index_google0day_itw_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134681,7 +131312,6 @@ async def index_google0day_itw_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134730,8 +131360,7 @@ async def index_google0day_itw_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134789,10 +131418,8 @@ async def index_google0day_itw_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134846,7 +131473,6 @@ async def index_google0day_itw_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134895,8 +131521,7 @@ async def index_google0day_itw_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134954,10 +131579,8 @@ async def index_google0day_itw_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -135011,7 +131634,6 @@ async def index_google0day_itw_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -135056,7 +131678,6 @@ def _index_google0day_itw_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -135157,10 +131778,6 @@ def _index_google0day_itw_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -135242,8 +131859,7 @@ async def index_google_container_optimized_os_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -135301,10 +131917,8 @@ async def index_google_container_optimized_os_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -135358,7 +131972,6 @@ async def index_google_container_optimized_os_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -135407,8 +132020,7 @@ async def index_google_container_optimized_os_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -135466,10 +132078,8 @@ async def index_google_container_optimized_os_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -135523,7 +132133,6 @@ async def index_google_container_optimized_os_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -135572,8 +132181,7 @@ async def index_google_container_optimized_os_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -135631,10 +132239,8 @@ async def index_google_container_optimized_os_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -135688,7 +132294,6 @@ async def index_google_container_optimized_os_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -135733,7 +132338,6 @@ def _index_google_container_optimized_os_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -135834,10 +132438,6 @@ def _index_google_container_optimized_os_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -135919,8 +132519,7 @@ async def index_grafana_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -135978,10 +132577,8 @@ async def index_grafana_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136035,7 +132632,6 @@ async def index_grafana_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136084,8 +132680,7 @@ async def index_grafana_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136143,10 +132738,8 @@ async def index_grafana_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136200,7 +132793,6 @@ async def index_grafana_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136249,8 +132841,7 @@ async def index_grafana_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136308,10 +132899,8 @@ async def index_grafana_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136365,7 +132954,6 @@ async def index_grafana_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136410,7 +132998,6 @@ def _index_grafana_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -136511,10 +133098,6 @@ def _index_grafana_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -136596,8 +133179,7 @@ async def index_greynoise_metadata_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136655,10 +133237,8 @@ async def index_greynoise_metadata_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136712,7 +133292,6 @@ async def index_greynoise_metadata_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136761,8 +133340,7 @@ async def index_greynoise_metadata_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136820,10 +133398,8 @@ async def index_greynoise_metadata_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136877,7 +133453,6 @@ async def index_greynoise_metadata_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136926,8 +133501,7 @@ async def index_greynoise_metadata_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136985,10 +133559,8 @@ async def index_greynoise_metadata_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -137042,7 +133614,6 @@ async def index_greynoise_metadata_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -137087,7 +133658,6 @@ def _index_greynoise_metadata_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -137188,10 +133758,6 @@ def _index_greynoise_metadata_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -137273,8 +133839,7 @@ async def index_hackage_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -137332,10 +133897,8 @@ async def index_hackage_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -137389,7 +133952,6 @@ async def index_hackage_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -137438,8 +134000,7 @@ async def index_hackage_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -137497,10 +134058,8 @@ async def index_hackage_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -137554,7 +134113,6 @@ async def index_hackage_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -137603,8 +134161,7 @@ async def index_hackage_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -137662,10 +134219,8 @@ async def index_hackage_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -137719,7 +134274,6 @@ async def index_hackage_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -137764,7 +134318,6 @@ def _index_hackage_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -137865,10 +134418,6 @@ def _index_hackage_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -137950,8 +134499,7 @@ async def index_hacktivity_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138009,10 +134557,8 @@ async def index_hacktivity_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138066,7 +134612,6 @@ async def index_hacktivity_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138115,8 +134660,7 @@ async def index_hacktivity_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138174,10 +134718,8 @@ async def index_hacktivity_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138231,7 +134773,6 @@ async def index_hacktivity_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138280,8 +134821,7 @@ async def index_hacktivity_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138339,10 +134879,8 @@ async def index_hacktivity_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138396,7 +134934,6 @@ async def index_hacktivity_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138441,7 +134978,6 @@ def _index_hacktivity_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -138542,10 +135078,6 @@ def _index_hacktivity_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -138627,8 +135159,7 @@ async def index_harmonyos_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138686,10 +135217,8 @@ async def index_harmonyos_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138743,7 +135272,6 @@ async def index_harmonyos_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138792,8 +135320,7 @@ async def index_harmonyos_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138851,10 +135378,8 @@ async def index_harmonyos_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138908,7 +135433,6 @@ async def index_harmonyos_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138957,8 +135481,7 @@ async def index_harmonyos_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -139016,10 +135539,8 @@ async def index_harmonyos_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -139073,7 +135594,6 @@ async def index_harmonyos_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -139118,7 +135638,6 @@ def _index_harmonyos_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -139219,10 +135738,6 @@ def _index_harmonyos_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -139304,8 +135819,7 @@ async def index_hashicorp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -139363,10 +135877,8 @@ async def index_hashicorp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -139420,7 +135932,6 @@ async def index_hashicorp_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -139469,8 +135980,7 @@ async def index_hashicorp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -139528,10 +136038,8 @@ async def index_hashicorp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -139585,7 +136093,6 @@ async def index_hashicorp_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -139634,8 +136141,7 @@ async def index_hashicorp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -139693,10 +136199,8 @@ async def index_hashicorp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -139750,7 +136254,6 @@ async def index_hashicorp_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -139795,7 +136298,6 @@ def _index_hashicorp_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -139896,10 +136398,6 @@ def _index_hashicorp_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -139981,8 +136479,7 @@ async def index_haskell_sadb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140040,10 +136537,8 @@ async def index_haskell_sadb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140097,7 +136592,6 @@ async def index_haskell_sadb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140146,8 +136640,7 @@ async def index_haskell_sadb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140205,10 +136698,8 @@ async def index_haskell_sadb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140262,7 +136753,6 @@ async def index_haskell_sadb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140311,8 +136801,7 @@ async def index_haskell_sadb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140370,10 +136859,8 @@ async def index_haskell_sadb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140427,7 +136914,6 @@ async def index_haskell_sadb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140472,7 +136958,6 @@ def _index_haskell_sadb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -140573,10 +137058,6 @@ def _index_haskell_sadb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -140658,8 +137139,7 @@ async def index_hcl_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140717,10 +137197,8 @@ async def index_hcl_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140774,7 +137252,6 @@ async def index_hcl_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140823,8 +137300,7 @@ async def index_hcl_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140882,10 +137358,8 @@ async def index_hcl_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140939,7 +137413,6 @@ async def index_hcl_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140988,8 +137461,7 @@ async def index_hcl_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -141047,10 +137519,8 @@ async def index_hcl_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -141104,7 +137574,6 @@ async def index_hcl_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -141149,7 +137618,6 @@ def _index_hcl_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -141250,10 +137718,6 @@ def _index_hcl_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -141335,8 +137799,7 @@ async def index_hex_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -141394,10 +137857,8 @@ async def index_hex_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -141451,7 +137912,6 @@ async def index_hex_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -141500,8 +137960,7 @@ async def index_hex_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -141559,10 +138018,8 @@ async def index_hex_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -141616,7 +138073,6 @@ async def index_hex_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -141665,8 +138121,7 @@ async def index_hex_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -141724,10 +138179,8 @@ async def index_hex_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -141781,7 +138234,6 @@ async def index_hex_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -141826,7 +138278,6 @@ def _index_hex_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -141927,10 +138378,6 @@ def _index_hex_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -142012,8 +138459,7 @@ async def index_hikvision_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142071,10 +138517,8 @@ async def index_hikvision_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142128,7 +138572,6 @@ async def index_hikvision_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -142177,8 +138620,7 @@ async def index_hikvision_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142236,10 +138678,8 @@ async def index_hikvision_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142293,7 +138733,6 @@ async def index_hikvision_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -142342,8 +138781,7 @@ async def index_hikvision_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142401,10 +138839,8 @@ async def index_hikvision_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142458,7 +138894,6 @@ async def index_hikvision_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -142503,7 +138938,6 @@ def _index_hikvision_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -142604,10 +139038,6 @@ def _index_hikvision_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -142689,8 +139119,7 @@ async def index_hillrom_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142748,10 +139177,8 @@ async def index_hillrom_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142805,7 +139232,6 @@ async def index_hillrom_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -142854,8 +139280,7 @@ async def index_hillrom_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142913,10 +139338,8 @@ async def index_hillrom_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142970,7 +139393,6 @@ async def index_hillrom_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143019,8 +139441,7 @@ async def index_hillrom_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -143078,10 +139499,8 @@ async def index_hillrom_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -143135,7 +139554,6 @@ async def index_hillrom_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143180,7 +139598,6 @@ def _index_hillrom_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -143281,10 +139698,6 @@ def _index_hillrom_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -143366,8 +139779,7 @@ async def index_hitachi_energy_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -143425,10 +139837,8 @@ async def index_hitachi_energy_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -143482,7 +139892,6 @@ async def index_hitachi_energy_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143531,8 +139940,7 @@ async def index_hitachi_energy_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -143590,10 +139998,8 @@ async def index_hitachi_energy_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -143647,7 +140053,6 @@ async def index_hitachi_energy_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143696,8 +140101,7 @@ async def index_hitachi_energy_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -143755,10 +140159,8 @@ async def index_hitachi_energy_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -143812,7 +140214,6 @@ async def index_hitachi_energy_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143857,7 +140258,6 @@ def _index_hitachi_energy_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -143958,10 +140358,6 @@ def _index_hitachi_energy_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -144043,8 +140439,7 @@ async def index_hitachi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144102,10 +140497,8 @@ async def index_hitachi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -144159,7 +140552,6 @@ async def index_hitachi_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -144208,8 +140600,7 @@ async def index_hitachi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144267,10 +140658,8 @@ async def index_hitachi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -144324,7 +140713,6 @@ async def index_hitachi_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -144373,8 +140761,7 @@ async def index_hitachi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144432,10 +140819,8 @@ async def index_hitachi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -144489,7 +140874,6 @@ async def index_hitachi_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -144534,7 +140918,6 @@ def _index_hitachi_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -144635,10 +141018,6 @@ def _index_hitachi_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -144720,8 +141099,7 @@ async def index_hkcert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144779,10 +141157,8 @@ async def index_hkcert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -144836,7 +141212,6 @@ async def index_hkcert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -144885,8 +141260,7 @@ async def index_hkcert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144944,10 +141318,8 @@ async def index_hkcert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145001,7 +141373,6 @@ async def index_hkcert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145050,8 +141421,7 @@ async def index_hkcert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -145109,10 +141479,8 @@ async def index_hkcert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145166,7 +141534,6 @@ async def index_hkcert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145211,7 +141578,6 @@ def _index_hkcert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -145312,10 +141678,6 @@ def _index_hkcert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -145397,8 +141759,7 @@ async def index_hms_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -145456,10 +141817,8 @@ async def index_hms_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145513,7 +141872,6 @@ async def index_hms_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145562,8 +141920,7 @@ async def index_hms_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -145621,10 +141978,8 @@ async def index_hms_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145678,7 +142033,6 @@ async def index_hms_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145727,8 +142081,7 @@ async def index_hms_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -145786,10 +142139,8 @@ async def index_hms_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145843,7 +142194,6 @@ async def index_hms_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145888,7 +142238,6 @@ def _index_hms_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -145989,10 +142338,6 @@ def _index_hms_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -146074,8 +142419,7 @@ async def index_honeywell_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146133,10 +142477,8 @@ async def index_honeywell_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -146190,7 +142532,6 @@ async def index_honeywell_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -146239,8 +142580,7 @@ async def index_honeywell_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146298,10 +142638,8 @@ async def index_honeywell_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -146355,7 +142693,6 @@ async def index_honeywell_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -146404,8 +142741,7 @@ async def index_honeywell_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146463,10 +142799,8 @@ async def index_honeywell_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -146520,7 +142854,6 @@ async def index_honeywell_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -146565,7 +142898,6 @@ def _index_honeywell_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -146666,10 +142998,6 @@ def _index_honeywell_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -146751,8 +143079,7 @@ async def index_hp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146810,10 +143137,8 @@ async def index_hp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -146867,7 +143192,6 @@ async def index_hp_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -146916,8 +143240,7 @@ async def index_hp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146975,10 +143298,8 @@ async def index_hp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147032,7 +143353,6 @@ async def index_hp_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147081,8 +143401,7 @@ async def index_hp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -147140,10 +143459,8 @@ async def index_hp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147197,7 +143514,6 @@ async def index_hp_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147242,7 +143558,6 @@ def _index_hp_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -147343,10 +143658,6 @@ def _index_hp_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -147428,8 +143739,7 @@ async def index_hpe_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -147487,10 +143797,8 @@ async def index_hpe_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147544,7 +143852,6 @@ async def index_hpe_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147593,8 +143900,7 @@ async def index_hpe_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -147652,10 +143958,8 @@ async def index_hpe_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147709,7 +144013,6 @@ async def index_hpe_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147758,8 +144061,7 @@ async def index_hpe_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -147817,10 +144119,8 @@ async def index_hpe_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147874,7 +144174,6 @@ async def index_hpe_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147919,7 +144218,6 @@ def _index_hpe_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -148020,10 +144318,6 @@ def _index_hpe_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -148105,8 +144399,7 @@ async def index_huawei_euleros_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148164,10 +144457,8 @@ async def index_huawei_euleros_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -148221,7 +144512,6 @@ async def index_huawei_euleros_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -148270,8 +144560,7 @@ async def index_huawei_euleros_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148329,10 +144618,8 @@ async def index_huawei_euleros_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -148386,7 +144673,6 @@ async def index_huawei_euleros_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -148435,8 +144721,7 @@ async def index_huawei_euleros_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148494,10 +144779,8 @@ async def index_huawei_euleros_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -148551,7 +144834,6 @@ async def index_huawei_euleros_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -148596,7 +144878,6 @@ def _index_huawei_euleros_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -148697,10 +144978,6 @@ def _index_huawei_euleros_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -148782,8 +145059,7 @@ async def index_huawei_ips_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148841,10 +145117,8 @@ async def index_huawei_ips_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -148898,7 +145172,6 @@ async def index_huawei_ips_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -148947,8 +145220,7 @@ async def index_huawei_ips_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149006,10 +145278,8 @@ async def index_huawei_ips_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149063,7 +145333,6 @@ async def index_huawei_ips_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149112,8 +145381,7 @@ async def index_huawei_ips_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149171,10 +145439,8 @@ async def index_huawei_ips_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149228,7 +145494,6 @@ async def index_huawei_ips_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149273,7 +145538,6 @@ def _index_huawei_ips_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -149374,10 +145638,6 @@ def _index_huawei_ips_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -149459,8 +145719,7 @@ async def index_huawei_psirt_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149518,10 +145777,8 @@ async def index_huawei_psirt_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149575,7 +145832,6 @@ async def index_huawei_psirt_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149624,8 +145880,7 @@ async def index_huawei_psirt_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149683,10 +145938,8 @@ async def index_huawei_psirt_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149740,7 +145993,6 @@ async def index_huawei_psirt_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149789,8 +146041,7 @@ async def index_huawei_psirt_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149848,10 +146099,8 @@ async def index_huawei_psirt_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149905,7 +146154,6 @@ async def index_huawei_psirt_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149950,7 +146198,6 @@ def _index_huawei_psirt_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -150051,10 +146298,6 @@ def _index_huawei_psirt_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -150136,8 +146379,7 @@ async def index_iava_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150195,10 +146437,8 @@ async def index_iava_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -150252,7 +146492,6 @@ async def index_iava_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -150301,8 +146540,7 @@ async def index_iava_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150360,10 +146598,8 @@ async def index_iava_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -150417,7 +146653,6 @@ async def index_iava_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -150466,8 +146701,7 @@ async def index_iava_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150525,10 +146759,8 @@ async def index_iava_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -150582,7 +146814,6 @@ async def index_iava_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -150627,7 +146858,6 @@ def _index_iava_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -150728,10 +146958,6 @@ def _index_iava_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -150813,8 +147039,7 @@ async def index_ibm_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150872,10 +147097,8 @@ async def index_ibm_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -150929,7 +147152,6 @@ async def index_ibm_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -150978,8 +147200,7 @@ async def index_ibm_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151037,10 +147258,8 @@ async def index_ibm_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151094,7 +147313,6 @@ async def index_ibm_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151143,8 +147361,7 @@ async def index_ibm_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151202,10 +147419,8 @@ async def index_ibm_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151259,7 +147474,6 @@ async def index_ibm_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151304,7 +147518,6 @@ def _index_ibm_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -151405,10 +147618,6 @@ def _index_ibm_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -151490,8 +147699,7 @@ async def index_idemia_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151549,10 +147757,8 @@ async def index_idemia_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151606,7 +147812,6 @@ async def index_idemia_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151655,8 +147860,7 @@ async def index_idemia_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151714,10 +147918,8 @@ async def index_idemia_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151771,7 +147973,6 @@ async def index_idemia_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151820,8 +148021,7 @@ async def index_idemia_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151879,10 +148079,8 @@ async def index_idemia_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151936,7 +148134,6 @@ async def index_idemia_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151981,7 +148178,6 @@ def _index_idemia_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -152082,10 +148278,6 @@ def _index_idemia_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -152167,8 +148359,7 @@ async def index_igel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -152226,10 +148417,8 @@ async def index_igel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -152283,7 +148472,6 @@ async def index_igel_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -152332,8 +148520,7 @@ async def index_igel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -152391,10 +148578,8 @@ async def index_igel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -152448,7 +148633,6 @@ async def index_igel_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -152497,8 +148681,7 @@ async def index_igel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -152556,10 +148739,8 @@ async def index_igel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -152613,7 +148794,6 @@ async def index_igel_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -152658,7 +148838,6 @@ def _index_igel_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -152759,10 +148938,6 @@ def _index_igel_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -152844,8 +149019,7 @@ async def index_il_alerts_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -152903,10 +149077,8 @@ async def index_il_alerts_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -152960,7 +149132,6 @@ async def index_il_alerts_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153009,8 +149180,7 @@ async def index_il_alerts_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153068,10 +149238,8 @@ async def index_il_alerts_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153125,7 +149293,6 @@ async def index_il_alerts_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153174,8 +149341,7 @@ async def index_il_alerts_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153233,10 +149399,8 @@ async def index_il_alerts_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153290,7 +149454,6 @@ async def index_il_alerts_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153335,7 +149498,6 @@ def _index_il_alerts_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -153436,10 +149598,6 @@ def _index_il_alerts_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -153521,8 +149679,7 @@ async def index_il_vulnerabilities_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153580,10 +149737,8 @@ async def index_il_vulnerabilities_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153637,7 +149792,6 @@ async def index_il_vulnerabilities_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153686,8 +149840,7 @@ async def index_il_vulnerabilities_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153745,10 +149898,8 @@ async def index_il_vulnerabilities_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153802,7 +149953,6 @@ async def index_il_vulnerabilities_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153851,8 +150001,7 @@ async def index_il_vulnerabilities_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153910,10 +150059,8 @@ async def index_il_vulnerabilities_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153967,7 +150114,6 @@ async def index_il_vulnerabilities_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -154012,7 +150158,6 @@ def _index_il_vulnerabilities_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -154113,10 +150258,6 @@ def _index_il_vulnerabilities_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -154198,8 +150339,7 @@ async def index_incibe_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -154257,10 +150397,8 @@ async def index_incibe_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -154314,7 +150452,6 @@ async def index_incibe_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -154363,8 +150500,7 @@ async def index_incibe_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -154422,10 +150558,8 @@ async def index_incibe_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -154479,7 +150613,6 @@ async def index_incibe_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -154528,8 +150661,7 @@ async def index_incibe_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -154587,10 +150719,8 @@ async def index_incibe_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -154644,7 +150774,6 @@ async def index_incibe_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -154689,7 +150818,6 @@ def _index_incibe_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -154790,10 +150918,6 @@ def _index_incibe_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -154875,8 +150999,7 @@ async def index_initial_access_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -154934,10 +151057,8 @@ async def index_initial_access_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -154991,7 +151112,6 @@ async def index_initial_access_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155040,8 +151160,7 @@ async def index_initial_access_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155099,10 +151218,8 @@ async def index_initial_access_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155156,7 +151273,6 @@ async def index_initial_access_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155205,8 +151321,7 @@ async def index_initial_access_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155264,10 +151379,8 @@ async def index_initial_access_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155321,7 +151434,6 @@ async def index_initial_access_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155366,7 +151478,6 @@ def _index_initial_access_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -155467,10 +151578,6 @@ def _index_initial_access_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -155552,8 +151659,7 @@ async def index_initial_access_git_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155611,10 +151717,8 @@ async def index_initial_access_git_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155668,7 +151772,6 @@ async def index_initial_access_git_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155717,8 +151820,7 @@ async def index_initial_access_git_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155776,10 +151878,8 @@ async def index_initial_access_git_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155833,7 +151933,6 @@ async def index_initial_access_git_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155882,8 +151981,7 @@ async def index_initial_access_git_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155941,10 +152039,8 @@ async def index_initial_access_git_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155998,7 +152094,6 @@ async def index_initial_access_git_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -156043,7 +152138,6 @@ def _index_initial_access_git_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -156144,10 +152238,6 @@ def _index_initial_access_git_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -156229,8 +152319,7 @@ async def index_intel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -156288,10 +152377,8 @@ async def index_intel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -156345,7 +152432,6 @@ async def index_intel_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -156394,8 +152480,7 @@ async def index_intel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -156453,10 +152538,8 @@ async def index_intel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -156510,7 +152593,6 @@ async def index_intel_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -156559,8 +152641,7 @@ async def index_intel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -156618,10 +152699,8 @@ async def index_intel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -156675,7 +152754,6 @@ async def index_intel_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -156720,7 +152798,6 @@ def _index_intel_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -156821,10 +152898,6 @@ def _index_intel_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -156911,8 +152984,7 @@ async def index_ipintel10d_get( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -156980,10 +153052,8 @@ async def index_ipintel10d_get( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157042,7 +153112,6 @@ async def index_ipintel10d_get( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -157096,8 +153165,7 @@ async def index_ipintel10d_get_with_http_info( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -157165,10 +153233,8 @@ async def index_ipintel10d_get_with_http_info( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157227,7 +153293,6 @@ async def index_ipintel10d_get_with_http_info( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -157281,8 +153346,7 @@ async def index_ipintel10d_get_without_preload_content( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -157350,10 +153414,8 @@ async def index_ipintel10d_get_without_preload_content( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157412,7 +153474,6 @@ async def index_ipintel10d_get_without_preload_content( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -157462,7 +153523,6 @@ def _index_ipintel10d_get_serialize( hostname, matches, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -157583,10 +153643,6 @@ def _index_ipintel10d_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -157673,8 +153729,7 @@ async def index_ipintel30d_get( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -157742,10 +153797,8 @@ async def index_ipintel30d_get( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157804,7 +153857,6 @@ async def index_ipintel30d_get( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -157858,8 +153910,7 @@ async def index_ipintel30d_get_with_http_info( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -157927,10 +153978,8 @@ async def index_ipintel30d_get_with_http_info( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157989,7 +154038,6 @@ async def index_ipintel30d_get_with_http_info( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158043,8 +154091,7 @@ async def index_ipintel30d_get_without_preload_content( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -158112,10 +154159,8 @@ async def index_ipintel30d_get_without_preload_content( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -158174,7 +154219,6 @@ async def index_ipintel30d_get_without_preload_content( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158224,7 +154268,6 @@ def _index_ipintel30d_get_serialize( hostname, matches, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -158345,10 +154388,6 @@ def _index_ipintel30d_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -158435,8 +154474,7 @@ async def index_ipintel3d_get( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -158504,10 +154542,8 @@ async def index_ipintel3d_get( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -158566,7 +154602,6 @@ async def index_ipintel3d_get( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158620,8 +154655,7 @@ async def index_ipintel3d_get_with_http_info( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -158689,10 +154723,8 @@ async def index_ipintel3d_get_with_http_info( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -158751,7 +154783,6 @@ async def index_ipintel3d_get_with_http_info( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158805,8 +154836,7 @@ async def index_ipintel3d_get_without_preload_content( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -158874,10 +154904,8 @@ async def index_ipintel3d_get_without_preload_content( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -158936,7 +154964,6 @@ async def index_ipintel3d_get_without_preload_content( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158986,7 +155013,6 @@ def _index_ipintel3d_get_serialize( hostname, matches, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -159107,10 +155133,6 @@ def _index_ipintel3d_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -159197,8 +155219,7 @@ async def index_ipintel90d_get( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -159266,10 +155287,8 @@ async def index_ipintel90d_get( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -159328,7 +155347,6 @@ async def index_ipintel90d_get( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -159382,8 +155400,7 @@ async def index_ipintel90d_get_with_http_info( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -159451,10 +155468,8 @@ async def index_ipintel90d_get_with_http_info( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -159513,7 +155528,6 @@ async def index_ipintel90d_get_with_http_info( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -159567,8 +155581,7 @@ async def index_ipintel90d_get_without_preload_content( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -159636,10 +155649,8 @@ async def index_ipintel90d_get_without_preload_content( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -159698,7 +155709,6 @@ async def index_ipintel90d_get_without_preload_content( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -159748,7 +155758,6 @@ def _index_ipintel90d_get_serialize( hostname, matches, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -159869,10 +155878,6 @@ def _index_ipintel90d_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -159954,8 +155959,7 @@ async def index_istio_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160013,10 +156017,8 @@ async def index_istio_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160070,7 +156072,6 @@ async def index_istio_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160119,8 +156120,7 @@ async def index_istio_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160178,10 +156178,8 @@ async def index_istio_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160235,7 +156233,6 @@ async def index_istio_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160284,8 +156281,7 @@ async def index_istio_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160343,10 +156339,8 @@ async def index_istio_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160400,7 +156394,6 @@ async def index_istio_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160445,7 +156438,6 @@ def _index_istio_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -160546,10 +156538,6 @@ def _index_istio_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -160631,8 +156619,7 @@ async def index_ivanti_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160690,10 +156677,8 @@ async def index_ivanti_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160747,7 +156732,6 @@ async def index_ivanti_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160796,8 +156780,7 @@ async def index_ivanti_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160855,10 +156838,8 @@ async def index_ivanti_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160912,7 +156893,6 @@ async def index_ivanti_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160961,8 +156941,7 @@ async def index_ivanti_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -161020,10 +156999,8 @@ async def index_ivanti_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -161077,7 +157054,6 @@ async def index_ivanti_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -161122,7 +157098,6 @@ def _index_ivanti_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -161223,10 +157198,6 @@ def _index_ivanti_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -161308,8 +157279,7 @@ async def index_ivanti_rss_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -161367,10 +157337,8 @@ async def index_ivanti_rss_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -161424,7 +157392,6 @@ async def index_ivanti_rss_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -161473,8 +157440,7 @@ async def index_ivanti_rss_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -161532,10 +157498,8 @@ async def index_ivanti_rss_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -161589,7 +157553,6 @@ async def index_ivanti_rss_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -161638,8 +157601,7 @@ async def index_ivanti_rss_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -161697,10 +157659,8 @@ async def index_ivanti_rss_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -161754,7 +157714,6 @@ async def index_ivanti_rss_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -161799,7 +157758,6 @@ def _index_ivanti_rss_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -161900,10 +157858,6 @@ def _index_ivanti_rss_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -161985,8 +157939,7 @@ async def index_jenkins_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162044,10 +157997,8 @@ async def index_jenkins_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162101,7 +158052,6 @@ async def index_jenkins_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162150,8 +158100,7 @@ async def index_jenkins_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162209,10 +158158,8 @@ async def index_jenkins_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162266,7 +158213,6 @@ async def index_jenkins_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162315,8 +158261,7 @@ async def index_jenkins_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162374,10 +158319,8 @@ async def index_jenkins_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162431,7 +158374,6 @@ async def index_jenkins_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162476,7 +158418,6 @@ def _index_jenkins_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -162577,10 +158518,6 @@ def _index_jenkins_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -162662,8 +158599,7 @@ async def index_jetbrains_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162721,10 +158657,8 @@ async def index_jetbrains_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162778,7 +158712,6 @@ async def index_jetbrains_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162827,8 +158760,7 @@ async def index_jetbrains_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162886,10 +158818,8 @@ async def index_jetbrains_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162943,7 +158873,6 @@ async def index_jetbrains_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162992,8 +158921,7 @@ async def index_jetbrains_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -163051,10 +158979,8 @@ async def index_jetbrains_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -163108,7 +159034,6 @@ async def index_jetbrains_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -163153,7 +159078,6 @@ def _index_jetbrains_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -163254,10 +159178,6 @@ def _index_jetbrains_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -163339,8 +159259,7 @@ async def index_jfrog_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -163398,10 +159317,8 @@ async def index_jfrog_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -163455,7 +159372,6 @@ async def index_jfrog_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -163504,8 +159420,7 @@ async def index_jfrog_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -163563,10 +159478,8 @@ async def index_jfrog_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -163620,7 +159533,6 @@ async def index_jfrog_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -163669,8 +159581,7 @@ async def index_jfrog_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -163728,10 +159639,8 @@ async def index_jfrog_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -163785,7 +159694,6 @@ async def index_jfrog_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -163830,7 +159738,6 @@ def _index_jfrog_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -163931,10 +159838,6 @@ def _index_jfrog_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -164016,8 +159919,7 @@ async def index_jnj_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164075,10 +159977,8 @@ async def index_jnj_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164132,7 +160032,6 @@ async def index_jnj_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -164181,8 +160080,7 @@ async def index_jnj_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164240,10 +160138,8 @@ async def index_jnj_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164297,7 +160193,6 @@ async def index_jnj_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -164346,8 +160241,7 @@ async def index_jnj_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164405,10 +160299,8 @@ async def index_jnj_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164462,7 +160354,6 @@ async def index_jnj_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -164507,7 +160398,6 @@ def _index_jnj_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -164608,10 +160498,6 @@ def _index_jnj_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -164693,8 +160579,7 @@ async def index_johnson_controls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164752,10 +160637,8 @@ async def index_johnson_controls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164809,7 +160692,6 @@ async def index_johnson_controls_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -164858,8 +160740,7 @@ async def index_johnson_controls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164917,10 +160798,8 @@ async def index_johnson_controls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164974,7 +160853,6 @@ async def index_johnson_controls_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165023,8 +160901,7 @@ async def index_johnson_controls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -165082,10 +160959,8 @@ async def index_johnson_controls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -165139,7 +161014,6 @@ async def index_johnson_controls_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165184,7 +161058,6 @@ def _index_johnson_controls_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -165285,10 +161158,6 @@ def _index_johnson_controls_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -165370,8 +161239,7 @@ async def index_juniper_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -165429,10 +161297,8 @@ async def index_juniper_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -165486,7 +161352,6 @@ async def index_juniper_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165535,8 +161400,7 @@ async def index_juniper_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -165594,10 +161458,8 @@ async def index_juniper_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -165651,7 +161513,6 @@ async def index_juniper_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165700,8 +161561,7 @@ async def index_juniper_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -165759,10 +161619,8 @@ async def index_juniper_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -165816,7 +161674,6 @@ async def index_juniper_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165861,7 +161718,6 @@ def _index_juniper_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -165962,10 +161818,6 @@ def _index_juniper_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -166047,8 +161899,7 @@ async def index_jvn_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166106,10 +161957,8 @@ async def index_jvn_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -166163,7 +162012,6 @@ async def index_jvn_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -166212,8 +162060,7 @@ async def index_jvn_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166271,10 +162118,8 @@ async def index_jvn_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -166328,7 +162173,6 @@ async def index_jvn_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -166377,8 +162221,7 @@ async def index_jvn_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166436,10 +162279,8 @@ async def index_jvn_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -166493,7 +162334,6 @@ async def index_jvn_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -166538,7 +162378,6 @@ def _index_jvn_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -166639,10 +162478,6 @@ def _index_jvn_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -166724,8 +162559,7 @@ async def index_jvndb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166783,10 +162617,8 @@ async def index_jvndb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -166840,7 +162672,6 @@ async def index_jvndb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -166889,8 +162720,7 @@ async def index_jvndb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166948,10 +162778,8 @@ async def index_jvndb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167005,7 +162833,6 @@ async def index_jvndb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167054,8 +162881,7 @@ async def index_jvndb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -167113,10 +162939,8 @@ async def index_jvndb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167170,7 +162994,6 @@ async def index_jvndb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167215,7 +163038,6 @@ def _index_jvndb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -167316,10 +163138,6 @@ def _index_jvndb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -167401,8 +163219,7 @@ async def index_kaspersky_ics_cert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -167460,10 +163277,8 @@ async def index_kaspersky_ics_cert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167517,7 +163332,6 @@ async def index_kaspersky_ics_cert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167566,8 +163380,7 @@ async def index_kaspersky_ics_cert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -167625,10 +163438,8 @@ async def index_kaspersky_ics_cert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167682,7 +163493,6 @@ async def index_kaspersky_ics_cert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167731,8 +163541,7 @@ async def index_kaspersky_ics_cert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -167790,10 +163599,8 @@ async def index_kaspersky_ics_cert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167847,7 +163654,6 @@ async def index_kaspersky_ics_cert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167892,7 +163698,6 @@ def _index_kaspersky_ics_cert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -167993,10 +163798,6 @@ def _index_kaspersky_ics_cert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -168078,8 +163879,7 @@ async def index_korelogic_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168137,10 +163937,8 @@ async def index_korelogic_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -168194,7 +163992,6 @@ async def index_korelogic_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -168243,8 +164040,7 @@ async def index_korelogic_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168302,10 +164098,8 @@ async def index_korelogic_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -168359,7 +164153,6 @@ async def index_korelogic_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -168408,8 +164201,7 @@ async def index_korelogic_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168467,10 +164259,8 @@ async def index_korelogic_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -168524,7 +164314,6 @@ async def index_korelogic_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -168569,7 +164358,6 @@ def _index_korelogic_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -168670,10 +164458,6 @@ def _index_korelogic_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -168755,8 +164539,7 @@ async def index_krcert_security_notices_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168814,10 +164597,8 @@ async def index_krcert_security_notices_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -168871,7 +164652,6 @@ async def index_krcert_security_notices_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -168920,8 +164700,7 @@ async def index_krcert_security_notices_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168979,10 +164758,8 @@ async def index_krcert_security_notices_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169036,7 +164813,6 @@ async def index_krcert_security_notices_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169085,8 +164861,7 @@ async def index_krcert_security_notices_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -169144,10 +164919,8 @@ async def index_krcert_security_notices_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169201,7 +164974,6 @@ async def index_krcert_security_notices_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169246,7 +165018,6 @@ def _index_krcert_security_notices_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -169347,10 +165118,6 @@ def _index_krcert_security_notices_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -169432,8 +165199,7 @@ async def index_krcert_vulnerabilities_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -169491,10 +165257,8 @@ async def index_krcert_vulnerabilities_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169548,7 +165312,6 @@ async def index_krcert_vulnerabilities_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169597,8 +165360,7 @@ async def index_krcert_vulnerabilities_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -169656,10 +165418,8 @@ async def index_krcert_vulnerabilities_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169713,7 +165473,6 @@ async def index_krcert_vulnerabilities_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169762,8 +165521,7 @@ async def index_krcert_vulnerabilities_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -169821,10 +165579,8 @@ async def index_krcert_vulnerabilities_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169878,7 +165634,6 @@ async def index_krcert_vulnerabilities_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169923,7 +165678,6 @@ def _index_krcert_vulnerabilities_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -170024,10 +165778,6 @@ def _index_krcert_vulnerabilities_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -170109,8 +165859,7 @@ async def index_kubernetes_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170168,10 +165917,8 @@ async def index_kubernetes_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -170225,7 +165972,6 @@ async def index_kubernetes_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -170274,8 +166020,7 @@ async def index_kubernetes_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170333,10 +166078,8 @@ async def index_kubernetes_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -170390,7 +166133,6 @@ async def index_kubernetes_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -170439,8 +166181,7 @@ async def index_kubernetes_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170498,10 +166239,8 @@ async def index_kubernetes_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -170555,7 +166294,6 @@ async def index_kubernetes_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -170600,7 +166338,6 @@ def _index_kubernetes_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -170701,10 +166438,6 @@ def _index_kubernetes_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -170786,8 +166519,7 @@ async def index_kunbus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170845,10 +166577,8 @@ async def index_kunbus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -170902,7 +166632,6 @@ async def index_kunbus_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -170951,8 +166680,7 @@ async def index_kunbus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171010,10 +166738,8 @@ async def index_kunbus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171067,7 +166793,6 @@ async def index_kunbus_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171116,8 +166841,7 @@ async def index_kunbus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171175,10 +166899,8 @@ async def index_kunbus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171232,7 +166954,6 @@ async def index_kunbus_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171277,7 +166998,6 @@ def _index_kunbus_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -171378,10 +167098,6 @@ def _index_kunbus_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -171463,8 +167179,7 @@ async def index_lantronix_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171522,10 +167237,8 @@ async def index_lantronix_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171579,7 +167292,6 @@ async def index_lantronix_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171628,8 +167340,7 @@ async def index_lantronix_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171687,10 +167398,8 @@ async def index_lantronix_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171744,7 +167453,6 @@ async def index_lantronix_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171793,8 +167501,7 @@ async def index_lantronix_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171852,10 +167559,8 @@ async def index_lantronix_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171909,7 +167614,6 @@ async def index_lantronix_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171954,7 +167658,6 @@ def _index_lantronix_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -172055,10 +167758,6 @@ def _index_lantronix_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -172140,8 +167839,7 @@ async def index_lenovo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -172199,10 +167897,8 @@ async def index_lenovo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -172256,7 +167952,6 @@ async def index_lenovo_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -172305,8 +168000,7 @@ async def index_lenovo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -172364,10 +168058,8 @@ async def index_lenovo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -172421,7 +168113,6 @@ async def index_lenovo_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -172470,8 +168161,7 @@ async def index_lenovo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -172529,10 +168219,8 @@ async def index_lenovo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -172586,7 +168274,6 @@ async def index_lenovo_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -172631,7 +168318,6 @@ def _index_lenovo_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -172732,10 +168418,6 @@ def _index_lenovo_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -172817,8 +168499,7 @@ async def index_lexmark_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -172876,10 +168557,8 @@ async def index_lexmark_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -172933,7 +168612,6 @@ async def index_lexmark_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -172982,8 +168660,7 @@ async def index_lexmark_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173041,10 +168718,8 @@ async def index_lexmark_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173098,7 +168773,6 @@ async def index_lexmark_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173147,8 +168821,7 @@ async def index_lexmark_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173206,10 +168879,8 @@ async def index_lexmark_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173263,7 +168934,6 @@ async def index_lexmark_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173308,7 +168978,6 @@ def _index_lexmark_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -173409,10 +169078,6 @@ def _index_lexmark_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -173494,8 +169159,7 @@ async def index_lg_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173553,10 +169217,8 @@ async def index_lg_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173610,7 +169272,6 @@ async def index_lg_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173659,8 +169320,7 @@ async def index_lg_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173718,10 +169378,8 @@ async def index_lg_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173775,7 +169433,6 @@ async def index_lg_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173824,8 +169481,7 @@ async def index_lg_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173883,10 +169539,8 @@ async def index_lg_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173940,7 +169594,6 @@ async def index_lg_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173985,7 +169638,6 @@ def _index_lg_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -174086,10 +169738,6 @@ def _index_lg_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -174171,8 +169819,7 @@ async def index_libre_office_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -174230,10 +169877,8 @@ async def index_libre_office_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -174287,7 +169932,6 @@ async def index_libre_office_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -174336,8 +169980,7 @@ async def index_libre_office_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -174395,10 +170038,8 @@ async def index_libre_office_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -174452,7 +170093,6 @@ async def index_libre_office_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -174501,8 +170141,7 @@ async def index_libre_office_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -174560,10 +170199,8 @@ async def index_libre_office_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -174617,7 +170254,6 @@ async def index_libre_office_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -174662,7 +170298,6 @@ def _index_libre_office_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -174763,10 +170398,6 @@ def _index_libre_office_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -174848,8 +170479,7 @@ async def index_linux_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -174907,10 +170537,8 @@ async def index_linux_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -174964,7 +170592,6 @@ async def index_linux_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175013,8 +170640,7 @@ async def index_linux_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175072,10 +170698,8 @@ async def index_linux_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175129,7 +170753,6 @@ async def index_linux_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175178,8 +170801,7 @@ async def index_linux_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175237,10 +170859,8 @@ async def index_linux_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175294,7 +170914,6 @@ async def index_linux_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175339,7 +170958,6 @@ def _index_linux_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -175440,10 +171058,6 @@ def _index_linux_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -175525,8 +171139,7 @@ async def index_lol_advs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175584,10 +171197,8 @@ async def index_lol_advs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175641,7 +171252,6 @@ async def index_lol_advs_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175690,8 +171300,7 @@ async def index_lol_advs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175749,10 +171358,8 @@ async def index_lol_advs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175806,7 +171413,6 @@ async def index_lol_advs_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175855,8 +171461,7 @@ async def index_lol_advs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175914,10 +171519,8 @@ async def index_lol_advs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175971,7 +171574,6 @@ async def index_lol_advs_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -176016,7 +171618,6 @@ def _index_lol_advs_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -176117,10 +171718,6 @@ def _index_lol_advs_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -176202,8 +171799,7 @@ async def index_m_files_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -176261,10 +171857,8 @@ async def index_m_files_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -176318,7 +171912,6 @@ async def index_m_files_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -176367,8 +171960,7 @@ async def index_m_files_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -176426,10 +172018,8 @@ async def index_m_files_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -176483,7 +172073,6 @@ async def index_m_files_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -176532,8 +172121,7 @@ async def index_m_files_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -176591,10 +172179,8 @@ async def index_m_files_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -176648,7 +172234,6 @@ async def index_m_files_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -176693,7 +172278,6 @@ def _index_m_files_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -176794,10 +172378,6 @@ def _index_m_files_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -176879,8 +172459,7 @@ async def index_macert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -176938,10 +172517,8 @@ async def index_macert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -176995,7 +172572,6 @@ async def index_macert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177044,8 +172620,7 @@ async def index_macert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177103,10 +172678,8 @@ async def index_macert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -177160,7 +172733,6 @@ async def index_macert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177209,8 +172781,7 @@ async def index_macert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177268,10 +172839,8 @@ async def index_macert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -177325,7 +172894,6 @@ async def index_macert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177370,7 +172938,6 @@ def _index_macert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -177471,10 +173038,6 @@ def _index_macert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -177556,8 +173119,7 @@ async def index_malicious_packages_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177615,10 +173177,8 @@ async def index_malicious_packages_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -177672,7 +173232,6 @@ async def index_malicious_packages_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177721,8 +173280,7 @@ async def index_malicious_packages_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177780,10 +173338,8 @@ async def index_malicious_packages_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -177837,7 +173393,6 @@ async def index_malicious_packages_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177886,8 +173441,7 @@ async def index_malicious_packages_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177945,10 +173499,8 @@ async def index_malicious_packages_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -178002,7 +173554,6 @@ async def index_malicious_packages_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -178047,7 +173598,6 @@ def _index_malicious_packages_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -178148,10 +173698,6 @@ def _index_malicious_packages_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -178233,8 +173779,7 @@ async def index_manageengine_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -178292,10 +173837,8 @@ async def index_manageengine_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -178349,7 +173892,6 @@ async def index_manageengine_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -178398,8 +173940,7 @@ async def index_manageengine_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -178457,10 +173998,8 @@ async def index_manageengine_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -178514,7 +174053,6 @@ async def index_manageengine_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -178563,8 +174101,7 @@ async def index_manageengine_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -178622,10 +174159,8 @@ async def index_manageengine_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -178679,7 +174214,6 @@ async def index_manageengine_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -178724,7 +174258,6 @@ def _index_manageengine_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -178825,10 +174358,6 @@ def _index_manageengine_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -178910,8 +174439,7 @@ async def index_maven_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -178969,10 +174497,8 @@ async def index_maven_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179026,7 +174552,6 @@ async def index_maven_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179075,8 +174600,7 @@ async def index_maven_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179134,10 +174658,8 @@ async def index_maven_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179191,7 +174713,6 @@ async def index_maven_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179240,8 +174761,7 @@ async def index_maven_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179299,10 +174819,8 @@ async def index_maven_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179356,7 +174874,6 @@ async def index_maven_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179401,7 +174918,6 @@ def _index_maven_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -179502,10 +175018,6 @@ def _index_maven_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -179587,8 +175099,7 @@ async def index_mbed_tls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179646,10 +175157,8 @@ async def index_mbed_tls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179703,7 +175212,6 @@ async def index_mbed_tls_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179752,8 +175260,7 @@ async def index_mbed_tls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179811,10 +175318,8 @@ async def index_mbed_tls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179868,7 +175373,6 @@ async def index_mbed_tls_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179917,8 +175421,7 @@ async def index_mbed_tls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179976,10 +175479,8 @@ async def index_mbed_tls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -180033,7 +175534,6 @@ async def index_mbed_tls_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -180078,7 +175578,6 @@ def _index_mbed_tls_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -180179,10 +175678,6 @@ def _index_mbed_tls_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -180264,8 +175759,7 @@ async def index_mcafee_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -180323,10 +175817,8 @@ async def index_mcafee_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -180380,7 +175872,6 @@ async def index_mcafee_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -180429,8 +175920,7 @@ async def index_mcafee_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -180488,10 +175978,8 @@ async def index_mcafee_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -180545,7 +176033,6 @@ async def index_mcafee_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -180594,8 +176081,7 @@ async def index_mcafee_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -180653,10 +176139,8 @@ async def index_mcafee_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -180710,7 +176194,6 @@ async def index_mcafee_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -180755,7 +176238,6 @@ def _index_mcafee_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -180856,10 +176338,6 @@ def _index_mcafee_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -180941,8 +176419,7 @@ async def index_mediatek_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181000,10 +176477,8 @@ async def index_mediatek_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181057,7 +176532,6 @@ async def index_mediatek_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181106,8 +176580,7 @@ async def index_mediatek_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181165,10 +176638,8 @@ async def index_mediatek_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181222,7 +176693,6 @@ async def index_mediatek_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181271,8 +176741,7 @@ async def index_mediatek_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181330,10 +176799,8 @@ async def index_mediatek_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181387,7 +176854,6 @@ async def index_mediatek_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181432,7 +176898,6 @@ def _index_mediatek_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -181533,10 +176998,6 @@ def _index_mediatek_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -181618,8 +177079,7 @@ async def index_medtronic_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181677,10 +177137,8 @@ async def index_medtronic_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181734,7 +177192,6 @@ async def index_medtronic_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181783,8 +177240,7 @@ async def index_medtronic_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181842,10 +177298,8 @@ async def index_medtronic_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181899,7 +177353,6 @@ async def index_medtronic_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181948,8 +177401,7 @@ async def index_medtronic_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -182007,10 +177459,8 @@ async def index_medtronic_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -182064,7 +177514,6 @@ async def index_medtronic_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -182109,7 +177558,6 @@ def _index_medtronic_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -182210,10 +177658,6 @@ def _index_medtronic_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -182295,8 +177739,7 @@ async def index_mendix_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -182354,10 +177797,8 @@ async def index_mendix_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -182411,7 +177852,6 @@ async def index_mendix_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -182460,8 +177900,7 @@ async def index_mendix_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -182519,10 +177958,8 @@ async def index_mendix_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -182576,7 +178013,6 @@ async def index_mendix_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -182625,8 +178061,7 @@ async def index_mendix_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -182684,10 +178119,8 @@ async def index_mendix_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -182741,7 +178174,6 @@ async def index_mendix_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -182786,7 +178218,6 @@ def _index_mendix_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -182887,10 +178318,6 @@ def _index_mendix_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -182972,8 +178399,7 @@ async def index_meta_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183031,10 +178457,8 @@ async def index_meta_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183088,7 +178512,6 @@ async def index_meta_advisories_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183137,8 +178560,7 @@ async def index_meta_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183196,10 +178618,8 @@ async def index_meta_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183253,7 +178673,6 @@ async def index_meta_advisories_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183302,8 +178721,7 @@ async def index_meta_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183361,10 +178779,8 @@ async def index_meta_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183418,7 +178834,6 @@ async def index_meta_advisories_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183463,7 +178878,6 @@ def _index_meta_advisories_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -183564,10 +178978,6 @@ def _index_meta_advisories_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -183649,8 +179059,7 @@ async def index_metasploit_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183708,10 +179117,8 @@ async def index_metasploit_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183765,7 +179172,6 @@ async def index_metasploit_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183814,8 +179220,7 @@ async def index_metasploit_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183873,10 +179278,8 @@ async def index_metasploit_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183930,7 +179333,6 @@ async def index_metasploit_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183979,8 +179381,7 @@ async def index_metasploit_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -184038,10 +179439,8 @@ async def index_metasploit_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -184095,7 +179494,6 @@ async def index_metasploit_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -184140,7 +179538,6 @@ def _index_metasploit_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -184241,10 +179638,6 @@ def _index_metasploit_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -184326,8 +179719,7 @@ async def index_microsoft_csaf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -184385,10 +179777,8 @@ async def index_microsoft_csaf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -184442,7 +179832,6 @@ async def index_microsoft_csaf_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -184491,8 +179880,7 @@ async def index_microsoft_csaf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -184550,10 +179938,8 @@ async def index_microsoft_csaf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -184607,7 +179993,6 @@ async def index_microsoft_csaf_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -184656,8 +180041,7 @@ async def index_microsoft_csaf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -184715,10 +180099,8 @@ async def index_microsoft_csaf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -184772,7 +180154,6 @@ async def index_microsoft_csaf_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -184817,7 +180198,6 @@ def _index_microsoft_csaf_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -184918,10 +180298,6 @@ def _index_microsoft_csaf_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -185003,8 +180379,7 @@ async def index_microsoft_cvrf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185062,10 +180437,8 @@ async def index_microsoft_cvrf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185119,7 +180492,6 @@ async def index_microsoft_cvrf_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -185168,8 +180540,7 @@ async def index_microsoft_cvrf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185227,10 +180598,8 @@ async def index_microsoft_cvrf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185284,7 +180653,6 @@ async def index_microsoft_cvrf_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -185333,8 +180701,7 @@ async def index_microsoft_cvrf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185392,10 +180759,8 @@ async def index_microsoft_cvrf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185449,7 +180814,6 @@ async def index_microsoft_cvrf_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -185494,7 +180858,6 @@ def _index_microsoft_cvrf_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -185595,10 +180958,6 @@ def _index_microsoft_cvrf_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -185680,8 +181039,7 @@ async def index_microsoft_driver_block_list_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185739,10 +181097,8 @@ async def index_microsoft_driver_block_list_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185796,7 +181152,6 @@ async def index_microsoft_driver_block_list_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -185845,8 +181200,7 @@ async def index_microsoft_driver_block_list_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185904,10 +181258,8 @@ async def index_microsoft_driver_block_list_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185961,7 +181313,6 @@ async def index_microsoft_driver_block_list_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186010,8 +181361,7 @@ async def index_microsoft_driver_block_list_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -186069,10 +181419,8 @@ async def index_microsoft_driver_block_list_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -186126,7 +181474,6 @@ async def index_microsoft_driver_block_list_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186171,7 +181518,6 @@ def _index_microsoft_driver_block_list_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -186272,10 +181618,6 @@ def _index_microsoft_driver_block_list_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -186357,8 +181699,7 @@ async def index_microsoft_kb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -186416,10 +181757,8 @@ async def index_microsoft_kb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -186473,7 +181812,6 @@ async def index_microsoft_kb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186522,8 +181860,7 @@ async def index_microsoft_kb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -186581,10 +181918,8 @@ async def index_microsoft_kb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -186638,7 +181973,6 @@ async def index_microsoft_kb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186687,8 +182021,7 @@ async def index_microsoft_kb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -186746,10 +182079,8 @@ async def index_microsoft_kb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -186803,7 +182134,6 @@ async def index_microsoft_kb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186848,7 +182178,6 @@ def _index_microsoft_kb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -186949,10 +182278,6 @@ def _index_microsoft_kb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -187034,8 +182359,7 @@ async def index_mikrotik_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187093,10 +182417,8 @@ async def index_mikrotik_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187150,7 +182472,6 @@ async def index_mikrotik_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -187199,8 +182520,7 @@ async def index_mikrotik_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187258,10 +182578,8 @@ async def index_mikrotik_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187315,7 +182633,6 @@ async def index_mikrotik_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -187364,8 +182681,7 @@ async def index_mikrotik_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187423,10 +182739,8 @@ async def index_mikrotik_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187480,7 +182794,6 @@ async def index_mikrotik_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -187525,7 +182838,6 @@ def _index_mikrotik_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -187626,10 +182938,6 @@ def _index_mikrotik_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -187711,8 +183019,7 @@ async def index_mindray_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187770,10 +183077,8 @@ async def index_mindray_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187827,7 +183132,6 @@ async def index_mindray_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -187876,8 +183180,7 @@ async def index_mindray_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187935,10 +183238,8 @@ async def index_mindray_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187992,7 +183293,6 @@ async def index_mindray_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188041,8 +183341,7 @@ async def index_mindray_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -188100,10 +183399,8 @@ async def index_mindray_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -188157,7 +183454,6 @@ async def index_mindray_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188202,7 +183498,6 @@ def _index_mindray_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -188303,10 +183598,6 @@ def _index_mindray_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -188388,8 +183679,7 @@ async def index_misp_threat_actors_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -188447,10 +183737,8 @@ async def index_misp_threat_actors_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -188504,7 +183792,6 @@ async def index_misp_threat_actors_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188553,8 +183840,7 @@ async def index_misp_threat_actors_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -188612,10 +183898,8 @@ async def index_misp_threat_actors_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -188669,7 +183953,6 @@ async def index_misp_threat_actors_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188718,8 +184001,7 @@ async def index_misp_threat_actors_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -188777,10 +184059,8 @@ async def index_misp_threat_actors_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -188834,7 +184114,6 @@ async def index_misp_threat_actors_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188879,7 +184158,6 @@ def _index_misp_threat_actors_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -188980,10 +184258,6 @@ def _index_misp_threat_actors_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -189065,8 +184339,7 @@ async def index_mitel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189124,10 +184397,8 @@ async def index_mitel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -189181,7 +184452,6 @@ async def index_mitel_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -189230,8 +184500,7 @@ async def index_mitel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189289,10 +184558,8 @@ async def index_mitel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -189346,7 +184613,6 @@ async def index_mitel_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -189395,8 +184661,7 @@ async def index_mitel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189454,10 +184719,8 @@ async def index_mitel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -189511,7 +184774,6 @@ async def index_mitel_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -189556,7 +184818,6 @@ def _index_mitel_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -189657,10 +184918,6 @@ def _index_mitel_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -189742,8 +184999,7 @@ async def index_mitre_attack_cve_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189801,10 +185057,8 @@ async def index_mitre_attack_cve_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -189858,7 +185112,6 @@ async def index_mitre_attack_cve_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -189907,8 +185160,7 @@ async def index_mitre_attack_cve_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189966,10 +185218,8 @@ async def index_mitre_attack_cve_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190023,7 +185273,6 @@ async def index_mitre_attack_cve_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190072,8 +185321,7 @@ async def index_mitre_attack_cve_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -190131,10 +185379,8 @@ async def index_mitre_attack_cve_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190188,7 +185434,6 @@ async def index_mitre_attack_cve_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190233,7 +185478,6 @@ def _index_mitre_attack_cve_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -190334,10 +185578,6 @@ def _index_mitre_attack_cve_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -190419,8 +185659,7 @@ async def index_mitre_cvelist_v5_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -190478,10 +185717,8 @@ async def index_mitre_cvelist_v5_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190535,7 +185772,6 @@ async def index_mitre_cvelist_v5_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190584,8 +185820,7 @@ async def index_mitre_cvelist_v5_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -190643,10 +185878,8 @@ async def index_mitre_cvelist_v5_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190700,7 +185933,6 @@ async def index_mitre_cvelist_v5_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190749,8 +185981,7 @@ async def index_mitre_cvelist_v5_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -190808,10 +186039,8 @@ async def index_mitre_cvelist_v5_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190865,7 +186094,6 @@ async def index_mitre_cvelist_v5_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190910,7 +186138,6 @@ def _index_mitre_cvelist_v5_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -191011,10 +186238,6 @@ def _index_mitre_cvelist_v5_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -191096,8 +186319,7 @@ async def index_mitsubishi_electric_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191155,10 +186377,8 @@ async def index_mitsubishi_electric_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -191212,7 +186432,6 @@ async def index_mitsubishi_electric_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -191261,8 +186480,7 @@ async def index_mitsubishi_electric_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191320,10 +186538,8 @@ async def index_mitsubishi_electric_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -191377,7 +186593,6 @@ async def index_mitsubishi_electric_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -191426,8 +186641,7 @@ async def index_mitsubishi_electric_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191485,10 +186699,8 @@ async def index_mitsubishi_electric_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -191542,7 +186754,6 @@ async def index_mitsubishi_electric_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -191587,7 +186798,6 @@ def _index_mitsubishi_electric_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -191688,10 +186898,6 @@ def _index_mitsubishi_electric_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -191773,8 +186979,7 @@ async def index_mongodb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191832,10 +187037,8 @@ async def index_mongodb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -191889,7 +187092,6 @@ async def index_mongodb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -191938,8 +187140,7 @@ async def index_mongodb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191997,10 +187198,8 @@ async def index_mongodb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192054,7 +187253,6 @@ async def index_mongodb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192103,8 +187301,7 @@ async def index_mongodb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -192162,10 +187359,8 @@ async def index_mongodb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192219,7 +187414,6 @@ async def index_mongodb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192264,7 +187458,6 @@ def _index_mongodb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -192365,10 +187558,6 @@ def _index_mongodb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -192450,8 +187639,7 @@ async def index_moxa_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -192509,10 +187697,8 @@ async def index_moxa_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192566,7 +187752,6 @@ async def index_moxa_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192615,8 +187800,7 @@ async def index_moxa_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -192674,10 +187858,8 @@ async def index_moxa_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192731,7 +187913,6 @@ async def index_moxa_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192780,8 +187961,7 @@ async def index_moxa_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -192839,10 +188019,8 @@ async def index_moxa_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192896,7 +188074,6 @@ async def index_moxa_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192941,7 +188118,6 @@ def _index_moxa_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -193042,10 +188218,6 @@ def _index_moxa_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -193127,8 +188299,7 @@ async def index_mozilla_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193186,10 +188357,8 @@ async def index_mozilla_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -193243,7 +188412,6 @@ async def index_mozilla_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -193292,8 +188460,7 @@ async def index_mozilla_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193351,10 +188518,8 @@ async def index_mozilla_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -193408,7 +188573,6 @@ async def index_mozilla_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -193457,8 +188621,7 @@ async def index_mozilla_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193516,10 +188679,8 @@ async def index_mozilla_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -193573,7 +188734,6 @@ async def index_mozilla_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -193618,7 +188778,6 @@ def _index_mozilla_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -193719,10 +188878,6 @@ def _index_mozilla_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -193804,8 +188959,7 @@ async def index_naver_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193863,10 +189017,8 @@ async def index_naver_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -193920,7 +189072,6 @@ async def index_naver_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -193969,8 +189120,7 @@ async def index_naver_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194028,10 +189178,8 @@ async def index_naver_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194085,7 +189233,6 @@ async def index_naver_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194134,8 +189281,7 @@ async def index_naver_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194193,10 +189339,8 @@ async def index_naver_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194250,7 +189394,6 @@ async def index_naver_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194295,7 +189438,6 @@ def _index_naver_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -194396,10 +189538,6 @@ def _index_naver_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -194481,8 +189619,7 @@ async def index_ncsc_cves_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194540,10 +189677,8 @@ async def index_ncsc_cves_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194597,7 +189732,6 @@ async def index_ncsc_cves_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194646,8 +189780,7 @@ async def index_ncsc_cves_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194705,10 +189838,8 @@ async def index_ncsc_cves_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194762,7 +189893,6 @@ async def index_ncsc_cves_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194811,8 +189941,7 @@ async def index_ncsc_cves_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194870,10 +189999,8 @@ async def index_ncsc_cves_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194927,7 +190054,6 @@ async def index_ncsc_cves_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194972,7 +190098,6 @@ def _index_ncsc_cves_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -195073,10 +190198,6 @@ def _index_ncsc_cves_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -195158,8 +190279,7 @@ async def index_ncsc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -195217,10 +190337,8 @@ async def index_ncsc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -195274,7 +190392,6 @@ async def index_ncsc_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -195323,8 +190440,7 @@ async def index_ncsc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -195382,10 +190498,8 @@ async def index_ncsc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -195439,7 +190553,6 @@ async def index_ncsc_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -195488,8 +190601,7 @@ async def index_ncsc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -195547,10 +190659,8 @@ async def index_ncsc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -195604,7 +190714,6 @@ async def index_ncsc_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -195649,7 +190758,6 @@ def _index_ncsc_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -195750,10 +190858,6 @@ def _index_ncsc_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -195835,8 +190939,7 @@ async def index_nec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -195894,10 +190997,8 @@ async def index_nec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -195951,7 +191052,6 @@ async def index_nec_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196000,8 +191100,7 @@ async def index_nec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196059,10 +191158,8 @@ async def index_nec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196116,7 +191213,6 @@ async def index_nec_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196165,8 +191261,7 @@ async def index_nec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196224,10 +191319,8 @@ async def index_nec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196281,7 +191374,6 @@ async def index_nec_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196326,7 +191418,6 @@ def _index_nec_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -196427,10 +191518,6 @@ def _index_nec_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -196512,8 +191599,7 @@ async def index_nessus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196571,10 +191657,8 @@ async def index_nessus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196628,7 +191712,6 @@ async def index_nessus_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196677,8 +191760,7 @@ async def index_nessus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196736,10 +191818,8 @@ async def index_nessus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196793,7 +191873,6 @@ async def index_nessus_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196842,8 +191921,7 @@ async def index_nessus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196901,10 +191979,8 @@ async def index_nessus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196958,7 +192034,6 @@ async def index_nessus_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -197003,7 +192078,6 @@ def _index_nessus_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -197104,10 +192178,6 @@ def _index_nessus_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -197189,8 +192259,7 @@ async def index_netapp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -197248,10 +192317,8 @@ async def index_netapp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -197305,7 +192372,6 @@ async def index_netapp_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -197354,8 +192420,7 @@ async def index_netapp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -197413,10 +192478,8 @@ async def index_netapp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -197470,7 +192533,6 @@ async def index_netapp_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -197519,8 +192581,7 @@ async def index_netapp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -197578,10 +192639,8 @@ async def index_netapp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -197635,7 +192694,6 @@ async def index_netapp_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -197680,7 +192738,6 @@ def _index_netapp_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -197781,10 +192838,6 @@ def _index_netapp_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -197866,8 +192919,7 @@ async def index_netatalk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -197925,10 +192977,8 @@ async def index_netatalk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -197982,7 +193032,6 @@ async def index_netatalk_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198031,8 +193080,7 @@ async def index_netatalk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198090,10 +193138,8 @@ async def index_netatalk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198147,7 +193193,6 @@ async def index_netatalk_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198196,8 +193241,7 @@ async def index_netatalk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198255,10 +193299,8 @@ async def index_netatalk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198312,7 +193354,6 @@ async def index_netatalk_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198357,7 +193398,6 @@ def _index_netatalk_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -198458,10 +193498,6 @@ def _index_netatalk_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -198543,8 +193579,7 @@ async def index_netgate_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198602,10 +193637,8 @@ async def index_netgate_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198659,7 +193692,6 @@ async def index_netgate_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198708,8 +193740,7 @@ async def index_netgate_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198767,10 +193798,8 @@ async def index_netgate_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198824,7 +193853,6 @@ async def index_netgate_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198873,8 +193901,7 @@ async def index_netgate_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198932,10 +193959,8 @@ async def index_netgate_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198989,7 +194014,6 @@ async def index_netgate_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -199034,7 +194058,6 @@ def _index_netgate_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -199135,10 +194158,6 @@ def _index_netgate_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -199220,8 +194239,7 @@ async def index_netgear_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -199279,10 +194297,8 @@ async def index_netgear_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -199336,7 +194352,6 @@ async def index_netgear_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -199385,8 +194400,7 @@ async def index_netgear_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -199444,10 +194458,8 @@ async def index_netgear_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -199501,7 +194513,6 @@ async def index_netgear_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -199550,8 +194561,7 @@ async def index_netgear_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -199609,10 +194619,8 @@ async def index_netgear_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -199666,7 +194674,6 @@ async def index_netgear_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -199711,7 +194718,6 @@ def _index_netgear_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -199812,10 +194818,6 @@ def _index_netgear_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -199897,8 +194899,7 @@ async def index_netskope_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -199956,10 +194957,8 @@ async def index_netskope_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200013,7 +195012,6 @@ async def index_netskope_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200062,8 +195060,7 @@ async def index_netskope_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200121,10 +195118,8 @@ async def index_netskope_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200178,7 +195173,6 @@ async def index_netskope_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200227,8 +195221,7 @@ async def index_netskope_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200286,10 +195279,8 @@ async def index_netskope_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200343,7 +195334,6 @@ async def index_netskope_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200388,7 +195378,6 @@ def _index_netskope_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -200489,10 +195478,6 @@ def _index_netskope_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -200574,8 +195559,7 @@ async def index_nexpose_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200633,10 +195617,8 @@ async def index_nexpose_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200690,7 +195672,6 @@ async def index_nexpose_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200739,8 +195720,7 @@ async def index_nexpose_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200798,10 +195778,8 @@ async def index_nexpose_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200855,7 +195833,6 @@ async def index_nexpose_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200904,8 +195881,7 @@ async def index_nexpose_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200963,10 +195939,8 @@ async def index_nexpose_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -201020,7 +195994,6 @@ async def index_nexpose_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -201065,7 +196038,6 @@ def _index_nexpose_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -201166,10 +196138,6 @@ def _index_nexpose_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -201251,8 +196219,7 @@ async def index_nginx_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -201310,10 +196277,8 @@ async def index_nginx_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -201367,7 +196332,6 @@ async def index_nginx_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -201416,8 +196380,7 @@ async def index_nginx_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -201475,10 +196438,8 @@ async def index_nginx_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -201532,7 +196493,6 @@ async def index_nginx_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -201581,8 +196541,7 @@ async def index_nginx_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -201640,10 +196599,8 @@ async def index_nginx_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -201697,7 +196654,6 @@ async def index_nginx_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -201742,7 +196698,6 @@ def _index_nginx_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -201843,10 +196798,6 @@ def _index_nginx_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -201928,8 +196879,7 @@ async def index_nhs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -201987,10 +196937,8 @@ async def index_nhs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202044,7 +196992,6 @@ async def index_nhs_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202093,8 +197040,7 @@ async def index_nhs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202152,10 +197098,8 @@ async def index_nhs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202209,7 +197153,6 @@ async def index_nhs_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202258,8 +197201,7 @@ async def index_nhs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202317,10 +197259,8 @@ async def index_nhs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202374,7 +197314,6 @@ async def index_nhs_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202419,7 +197358,6 @@ def _index_nhs_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -202520,10 +197458,6 @@ def _index_nhs_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -202605,8 +197539,7 @@ async def index_ni_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202664,10 +197597,8 @@ async def index_ni_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202721,7 +197652,6 @@ async def index_ni_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202770,8 +197700,7 @@ async def index_ni_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202829,10 +197758,8 @@ async def index_ni_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202886,7 +197813,6 @@ async def index_ni_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202935,8 +197861,7 @@ async def index_ni_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202994,10 +197919,8 @@ async def index_ni_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -203051,7 +197974,6 @@ async def index_ni_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -203096,7 +198018,6 @@ def _index_ni_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -203197,10 +198118,6 @@ def _index_ni_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -203282,8 +198199,7 @@ async def index_nist_nvd2_cpematch_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -203341,10 +198257,8 @@ async def index_nist_nvd2_cpematch_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -203398,7 +198312,6 @@ async def index_nist_nvd2_cpematch_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -203447,8 +198360,7 @@ async def index_nist_nvd2_cpematch_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -203506,10 +198418,8 @@ async def index_nist_nvd2_cpematch_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -203563,7 +198473,6 @@ async def index_nist_nvd2_cpematch_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -203612,8 +198521,7 @@ async def index_nist_nvd2_cpematch_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -203671,10 +198579,8 @@ async def index_nist_nvd2_cpematch_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -203728,7 +198634,6 @@ async def index_nist_nvd2_cpematch_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -203773,7 +198678,6 @@ def _index_nist_nvd2_cpematch_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -203874,10 +198778,6 @@ def _index_nist_nvd2_cpematch_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -203959,8 +198859,7 @@ async def index_nist_nvd2_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204018,10 +198917,8 @@ async def index_nist_nvd2_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204075,7 +198972,6 @@ async def index_nist_nvd2_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204124,8 +199020,7 @@ async def index_nist_nvd2_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204183,10 +199078,8 @@ async def index_nist_nvd2_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204240,7 +199133,6 @@ async def index_nist_nvd2_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204289,8 +199181,7 @@ async def index_nist_nvd2_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204348,10 +199239,8 @@ async def index_nist_nvd2_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204405,7 +199294,6 @@ async def index_nist_nvd2_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204450,7 +199338,6 @@ def _index_nist_nvd2_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -204551,10 +199438,6 @@ def _index_nist_nvd2_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -204636,8 +199519,7 @@ async def index_nist_nvd2_sources_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204695,10 +199577,8 @@ async def index_nist_nvd2_sources_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204752,7 +199632,6 @@ async def index_nist_nvd2_sources_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204801,8 +199680,7 @@ async def index_nist_nvd2_sources_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204860,10 +199738,8 @@ async def index_nist_nvd2_sources_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204917,7 +199793,6 @@ async def index_nist_nvd2_sources_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204966,8 +199841,7 @@ async def index_nist_nvd2_sources_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -205025,10 +199899,8 @@ async def index_nist_nvd2_sources_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -205082,7 +199954,6 @@ async def index_nist_nvd2_sources_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -205127,7 +199998,6 @@ def _index_nist_nvd2_sources_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -205228,10 +200098,6 @@ def _index_nist_nvd2_sources_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -205313,8 +200179,7 @@ async def index_nist_nvd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -205372,10 +200237,8 @@ async def index_nist_nvd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -205429,7 +200292,6 @@ async def index_nist_nvd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -205478,8 +200340,7 @@ async def index_nist_nvd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -205537,10 +200398,8 @@ async def index_nist_nvd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -205594,7 +200453,6 @@ async def index_nist_nvd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -205643,8 +200501,7 @@ async def index_nist_nvd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -205702,10 +200559,8 @@ async def index_nist_nvd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -205759,7 +200614,6 @@ async def index_nist_nvd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -205804,7 +200658,6 @@ def _index_nist_nvd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -205905,10 +200758,6 @@ def _index_nist_nvd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -205990,8 +200839,7 @@ async def index_node_security_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206049,10 +200897,8 @@ async def index_node_security_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206106,7 +200952,6 @@ async def index_node_security_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206155,8 +201000,7 @@ async def index_node_security_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206214,10 +201058,8 @@ async def index_node_security_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206271,7 +201113,6 @@ async def index_node_security_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206320,8 +201161,7 @@ async def index_node_security_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206379,10 +201219,8 @@ async def index_node_security_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206436,7 +201274,6 @@ async def index_node_security_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206481,7 +201318,6 @@ def _index_node_security_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -206582,10 +201418,6 @@ def _index_node_security_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -206667,8 +201499,7 @@ async def index_nodejs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206726,10 +201557,8 @@ async def index_nodejs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206783,7 +201612,6 @@ async def index_nodejs_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206832,8 +201660,7 @@ async def index_nodejs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206891,10 +201718,8 @@ async def index_nodejs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206948,7 +201773,6 @@ async def index_nodejs_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206997,8 +201821,7 @@ async def index_nodejs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -207056,10 +201879,8 @@ async def index_nodejs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -207113,7 +201934,6 @@ async def index_nodejs_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -207158,7 +201978,6 @@ def _index_nodejs_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -207259,10 +202078,6 @@ def _index_nodejs_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -207344,8 +202159,7 @@ async def index_nokia_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -207403,10 +202217,8 @@ async def index_nokia_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -207460,7 +202272,6 @@ async def index_nokia_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -207509,8 +202320,7 @@ async def index_nokia_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -207568,10 +202378,8 @@ async def index_nokia_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -207625,7 +202433,6 @@ async def index_nokia_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -207674,8 +202481,7 @@ async def index_nokia_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -207733,10 +202539,8 @@ async def index_nokia_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -207790,7 +202594,6 @@ async def index_nokia_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -207835,7 +202638,6 @@ def _index_nokia_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -207936,10 +202738,6 @@ def _index_nokia_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -208021,8 +202819,7 @@ async def index_notepadplusplus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208080,10 +202877,8 @@ async def index_notepadplusplus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208137,7 +202932,6 @@ async def index_notepadplusplus_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -208186,8 +202980,7 @@ async def index_notepadplusplus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208245,10 +203038,8 @@ async def index_notepadplusplus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208302,7 +203093,6 @@ async def index_notepadplusplus_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -208351,8 +203141,7 @@ async def index_notepadplusplus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208410,10 +203199,8 @@ async def index_notepadplusplus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208467,7 +203254,6 @@ async def index_notepadplusplus_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -208512,7 +203298,6 @@ def _index_notepadplusplus_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -208613,10 +203398,6 @@ def _index_notepadplusplus_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -208698,8 +203479,7 @@ async def index_nozomi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208757,10 +203537,8 @@ async def index_nozomi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208814,7 +203592,6 @@ async def index_nozomi_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -208863,8 +203640,7 @@ async def index_nozomi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208922,10 +203698,8 @@ async def index_nozomi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208979,7 +203753,6 @@ async def index_nozomi_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209028,8 +203801,7 @@ async def index_nozomi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -209087,10 +203859,8 @@ async def index_nozomi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -209144,7 +203914,6 @@ async def index_nozomi_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209189,7 +203958,6 @@ def _index_nozomi_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -209290,10 +204058,6 @@ def _index_nozomi_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -209375,8 +204139,7 @@ async def index_npm_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -209434,10 +204197,8 @@ async def index_npm_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -209491,7 +204252,6 @@ async def index_npm_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209540,8 +204300,7 @@ async def index_npm_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -209599,10 +204358,8 @@ async def index_npm_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -209656,7 +204413,6 @@ async def index_npm_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209705,8 +204461,7 @@ async def index_npm_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -209764,10 +204519,8 @@ async def index_npm_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -209821,7 +204574,6 @@ async def index_npm_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209866,7 +204618,6 @@ def _index_npm_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -209967,10 +204718,6 @@ def _index_npm_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -210052,8 +204799,7 @@ async def index_ntp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210111,10 +204857,8 @@ async def index_ntp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -210168,7 +204912,6 @@ async def index_ntp_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -210217,8 +204960,7 @@ async def index_ntp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210276,10 +205018,8 @@ async def index_ntp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -210333,7 +205073,6 @@ async def index_ntp_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -210382,8 +205121,7 @@ async def index_ntp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210441,10 +205179,8 @@ async def index_ntp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -210498,7 +205234,6 @@ async def index_ntp_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -210543,7 +205278,6 @@ def _index_ntp_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -210644,10 +205378,6 @@ def _index_ntp_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -210729,8 +205459,7 @@ async def index_nuclei_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210788,10 +205517,8 @@ async def index_nuclei_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -210845,7 +205572,6 @@ async def index_nuclei_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -210894,8 +205620,7 @@ async def index_nuclei_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210953,10 +205678,8 @@ async def index_nuclei_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211010,7 +205733,6 @@ async def index_nuclei_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211059,8 +205781,7 @@ async def index_nuclei_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -211118,10 +205839,8 @@ async def index_nuclei_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211175,7 +205894,6 @@ async def index_nuclei_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211220,7 +205938,6 @@ def _index_nuclei_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -211321,10 +206038,6 @@ def _index_nuclei_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -211406,8 +206119,7 @@ async def index_nuget_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -211465,10 +206177,8 @@ async def index_nuget_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211522,7 +206232,6 @@ async def index_nuget_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211571,8 +206280,7 @@ async def index_nuget_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -211630,10 +206338,8 @@ async def index_nuget_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211687,7 +206393,6 @@ async def index_nuget_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211736,8 +206441,7 @@ async def index_nuget_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -211795,10 +206499,8 @@ async def index_nuget_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211852,7 +206554,6 @@ async def index_nuget_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211897,7 +206598,6 @@ def _index_nuget_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -211998,10 +206698,6 @@ def _index_nuget_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -212083,8 +206779,7 @@ async def index_nvd_cpe_dictionary_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212142,10 +206837,8 @@ async def index_nvd_cpe_dictionary_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -212199,7 +206892,6 @@ async def index_nvd_cpe_dictionary_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -212248,8 +206940,7 @@ async def index_nvd_cpe_dictionary_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212307,10 +206998,8 @@ async def index_nvd_cpe_dictionary_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -212364,7 +207053,6 @@ async def index_nvd_cpe_dictionary_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -212413,8 +207101,7 @@ async def index_nvd_cpe_dictionary_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212472,10 +207159,8 @@ async def index_nvd_cpe_dictionary_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -212529,7 +207214,6 @@ async def index_nvd_cpe_dictionary_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -212574,7 +207258,6 @@ def _index_nvd_cpe_dictionary_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -212675,10 +207358,6 @@ def _index_nvd_cpe_dictionary_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -212760,8 +207439,7 @@ async def index_nvidia_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212819,10 +207497,8 @@ async def index_nvidia_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -212876,7 +207552,6 @@ async def index_nvidia_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -212925,8 +207600,7 @@ async def index_nvidia_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212984,10 +207658,8 @@ async def index_nvidia_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213041,7 +207713,6 @@ async def index_nvidia_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213090,8 +207761,7 @@ async def index_nvidia_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -213149,10 +207819,8 @@ async def index_nvidia_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213206,7 +207874,6 @@ async def index_nvidia_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213251,7 +207918,6 @@ def _index_nvidia_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -213352,10 +208018,6 @@ def _index_nvidia_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -213437,8 +208099,7 @@ async def index_nz_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -213496,10 +208157,8 @@ async def index_nz_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213553,7 +208212,6 @@ async def index_nz_advisories_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213602,8 +208260,7 @@ async def index_nz_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -213661,10 +208318,8 @@ async def index_nz_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213718,7 +208373,6 @@ async def index_nz_advisories_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213767,8 +208421,7 @@ async def index_nz_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -213826,10 +208479,8 @@ async def index_nz_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213883,7 +208534,6 @@ async def index_nz_advisories_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213928,7 +208578,6 @@ def _index_nz_advisories_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -214029,10 +208678,6 @@ def _index_nz_advisories_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -214114,8 +208759,7 @@ async def index_octopus_deploy_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214173,10 +208817,8 @@ async def index_octopus_deploy_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -214230,7 +208872,6 @@ async def index_octopus_deploy_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -214279,8 +208920,7 @@ async def index_octopus_deploy_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214338,10 +208978,8 @@ async def index_octopus_deploy_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -214395,7 +209033,6 @@ async def index_octopus_deploy_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -214444,8 +209081,7 @@ async def index_octopus_deploy_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214503,10 +209139,8 @@ async def index_octopus_deploy_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -214560,7 +209194,6 @@ async def index_octopus_deploy_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -214605,7 +209238,6 @@ def _index_octopus_deploy_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -214706,10 +209338,6 @@ def _index_octopus_deploy_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -214791,8 +209419,7 @@ async def index_okta_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214850,10 +209477,8 @@ async def index_okta_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -214907,7 +209532,6 @@ async def index_okta_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -214956,8 +209580,7 @@ async def index_okta_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215015,10 +209638,8 @@ async def index_okta_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215072,7 +209693,6 @@ async def index_okta_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215121,8 +209741,7 @@ async def index_okta_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215180,10 +209799,8 @@ async def index_okta_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215237,7 +209854,6 @@ async def index_okta_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215282,7 +209898,6 @@ def _index_okta_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -215383,10 +209998,6 @@ def _index_okta_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -215468,8 +210079,7 @@ async def index_omron_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215527,10 +210137,8 @@ async def index_omron_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215584,7 +210192,6 @@ async def index_omron_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215633,8 +210240,7 @@ async def index_omron_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215692,10 +210298,8 @@ async def index_omron_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215749,7 +210353,6 @@ async def index_omron_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215798,8 +210401,7 @@ async def index_omron_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215857,10 +210459,8 @@ async def index_omron_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215914,7 +210514,6 @@ async def index_omron_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215959,7 +210558,6 @@ def _index_omron_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -216060,10 +210658,6 @@ def _index_omron_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -216145,8 +210739,7 @@ async def index_one_e_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -216204,10 +210797,8 @@ async def index_one_e_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -216261,7 +210852,6 @@ async def index_one_e_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -216310,8 +210900,7 @@ async def index_one_e_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -216369,10 +210958,8 @@ async def index_one_e_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -216426,7 +211013,6 @@ async def index_one_e_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -216475,8 +211061,7 @@ async def index_one_e_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -216534,10 +211119,8 @@ async def index_one_e_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -216591,7 +211174,6 @@ async def index_one_e_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -216636,7 +211218,6 @@ def _index_one_e_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -216737,10 +211318,6 @@ def _index_one_e_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -216822,8 +211399,7 @@ async def index_opam_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -216881,10 +211457,8 @@ async def index_opam_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -216938,7 +211512,6 @@ async def index_opam_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -216987,8 +211560,7 @@ async def index_opam_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217046,10 +211618,8 @@ async def index_opam_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217103,7 +211673,6 @@ async def index_opam_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217152,8 +211721,7 @@ async def index_opam_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217211,10 +211779,8 @@ async def index_opam_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217268,7 +211834,6 @@ async def index_opam_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217313,7 +211878,6 @@ def _index_opam_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -217414,10 +211978,6 @@ def _index_opam_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -217499,8 +212059,7 @@ async def index_open_cvdb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217558,10 +212117,8 @@ async def index_open_cvdb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217615,7 +212172,6 @@ async def index_open_cvdb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217664,8 +212220,7 @@ async def index_open_cvdb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217723,10 +212278,8 @@ async def index_open_cvdb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217780,7 +212333,6 @@ async def index_open_cvdb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217829,8 +212381,7 @@ async def index_open_cvdb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217888,10 +212439,8 @@ async def index_open_cvdb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217945,7 +212494,6 @@ async def index_open_cvdb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217990,7 +212538,6 @@ def _index_open_cvdb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -218091,10 +212638,6 @@ def _index_open_cvdb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -218176,8 +212719,7 @@ async def index_openbsd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -218235,10 +212777,8 @@ async def index_openbsd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -218292,7 +212832,6 @@ async def index_openbsd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -218341,8 +212880,7 @@ async def index_openbsd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -218400,10 +212938,8 @@ async def index_openbsd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -218457,7 +212993,6 @@ async def index_openbsd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -218506,8 +213041,7 @@ async def index_openbsd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -218565,10 +213099,8 @@ async def index_openbsd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -218622,7 +213154,6 @@ async def index_openbsd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -218667,7 +213198,6 @@ def _index_openbsd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -218768,10 +213298,6 @@ def _index_openbsd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -218853,8 +213379,7 @@ async def index_opengear_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -218912,10 +213437,8 @@ async def index_opengear_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -218969,7 +213492,6 @@ async def index_opengear_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219018,8 +213540,7 @@ async def index_opengear_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219077,10 +213598,8 @@ async def index_opengear_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219134,7 +213653,6 @@ async def index_opengear_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219183,8 +213701,7 @@ async def index_opengear_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219242,10 +213759,8 @@ async def index_opengear_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219299,7 +213814,6 @@ async def index_opengear_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219344,7 +213858,6 @@ def _index_opengear_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -219445,10 +213958,6 @@ def _index_opengear_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -219530,8 +214039,7 @@ async def index_openjdk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219589,10 +214097,8 @@ async def index_openjdk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219646,7 +214152,6 @@ async def index_openjdk_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219695,8 +214200,7 @@ async def index_openjdk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219754,10 +214258,8 @@ async def index_openjdk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219811,7 +214313,6 @@ async def index_openjdk_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219860,8 +214361,7 @@ async def index_openjdk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219919,10 +214419,8 @@ async def index_openjdk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219976,7 +214474,6 @@ async def index_openjdk_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -220021,7 +214518,6 @@ def _index_openjdk_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -220122,10 +214618,6 @@ def _index_openjdk_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -220207,8 +214699,7 @@ async def index_openssh_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -220266,10 +214757,8 @@ async def index_openssh_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -220323,7 +214812,6 @@ async def index_openssh_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -220372,8 +214860,7 @@ async def index_openssh_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -220431,10 +214918,8 @@ async def index_openssh_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -220488,7 +214973,6 @@ async def index_openssh_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -220537,8 +215021,7 @@ async def index_openssh_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -220596,10 +215079,8 @@ async def index_openssh_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -220653,7 +215134,6 @@ async def index_openssh_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -220698,7 +215178,6 @@ def _index_openssh_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -220799,10 +215278,6 @@ def _index_openssh_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -220884,8 +215359,7 @@ async def index_openssl_secadv_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -220943,10 +215417,8 @@ async def index_openssl_secadv_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221000,7 +215472,6 @@ async def index_openssl_secadv_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221049,8 +215520,7 @@ async def index_openssl_secadv_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221108,10 +215578,8 @@ async def index_openssl_secadv_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221165,7 +215633,6 @@ async def index_openssl_secadv_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221214,8 +215681,7 @@ async def index_openssl_secadv_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221273,10 +215739,8 @@ async def index_openssl_secadv_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221330,7 +215794,6 @@ async def index_openssl_secadv_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221375,7 +215838,6 @@ def _index_openssl_secadv_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -221476,10 +215938,6 @@ def _index_openssl_secadv_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -221561,8 +216019,7 @@ async def index_openstack_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221620,10 +216077,8 @@ async def index_openstack_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221677,7 +216132,6 @@ async def index_openstack_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221726,8 +216180,7 @@ async def index_openstack_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221785,10 +216238,8 @@ async def index_openstack_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221842,7 +216293,6 @@ async def index_openstack_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221891,8 +216341,7 @@ async def index_openstack_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221950,10 +216399,8 @@ async def index_openstack_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -222007,7 +216454,6 @@ async def index_openstack_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -222052,7 +216498,6 @@ def _index_openstack_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -222153,10 +216598,6 @@ def _index_openstack_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -222238,8 +216679,7 @@ async def index_openwrt_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -222297,10 +216737,8 @@ async def index_openwrt_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -222354,7 +216792,6 @@ async def index_openwrt_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -222403,8 +216840,7 @@ async def index_openwrt_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -222462,10 +216898,8 @@ async def index_openwrt_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -222519,7 +216953,6 @@ async def index_openwrt_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -222568,8 +217001,7 @@ async def index_openwrt_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -222627,10 +217059,8 @@ async def index_openwrt_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -222684,7 +217114,6 @@ async def index_openwrt_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -222729,7 +217158,6 @@ def _index_openwrt_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -222830,10 +217258,6 @@ def _index_openwrt_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -222915,8 +217339,7 @@ async def index_oracle_cpu_csaf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -222974,10 +217397,8 @@ async def index_oracle_cpu_csaf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223031,7 +217452,6 @@ async def index_oracle_cpu_csaf_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223080,8 +217500,7 @@ async def index_oracle_cpu_csaf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223139,10 +217558,8 @@ async def index_oracle_cpu_csaf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223196,7 +217613,6 @@ async def index_oracle_cpu_csaf_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223245,8 +217661,7 @@ async def index_oracle_cpu_csaf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223304,10 +217719,8 @@ async def index_oracle_cpu_csaf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223361,7 +217774,6 @@ async def index_oracle_cpu_csaf_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223406,7 +217818,6 @@ def _index_oracle_cpu_csaf_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -223507,10 +217918,6 @@ def _index_oracle_cpu_csaf_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -223592,8 +217999,7 @@ async def index_oracle_cpu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223651,10 +218057,8 @@ async def index_oracle_cpu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223708,7 +218112,6 @@ async def index_oracle_cpu_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223757,8 +218160,7 @@ async def index_oracle_cpu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223816,10 +218218,8 @@ async def index_oracle_cpu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223873,7 +218273,6 @@ async def index_oracle_cpu_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223922,8 +218321,7 @@ async def index_oracle_cpu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223981,10 +218379,8 @@ async def index_oracle_cpu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -224038,7 +218434,6 @@ async def index_oracle_cpu_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -224083,7 +218478,6 @@ def _index_oracle_cpu_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -224184,10 +218578,6 @@ def _index_oracle_cpu_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -224269,8 +218659,7 @@ async def index_oracle_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -224328,10 +218717,8 @@ async def index_oracle_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -224385,7 +218772,6 @@ async def index_oracle_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -224434,8 +218820,7 @@ async def index_oracle_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -224493,10 +218878,8 @@ async def index_oracle_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -224550,7 +218933,6 @@ async def index_oracle_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -224599,8 +218981,7 @@ async def index_oracle_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -224658,10 +219039,8 @@ async def index_oracle_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -224715,7 +219094,6 @@ async def index_oracle_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -224760,7 +219138,6 @@ def _index_oracle_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -224861,10 +219238,6 @@ def _index_oracle_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -224946,8 +219319,7 @@ async def index_osv_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225005,10 +219377,8 @@ async def index_osv_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225062,7 +219432,6 @@ async def index_osv_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225111,8 +219480,7 @@ async def index_osv_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225170,10 +219538,8 @@ async def index_osv_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225227,7 +219593,6 @@ async def index_osv_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225276,8 +219641,7 @@ async def index_osv_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225335,10 +219699,8 @@ async def index_osv_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225392,7 +219754,6 @@ async def index_osv_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225437,7 +219798,6 @@ def _index_osv_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -225538,10 +219898,6 @@ def _index_osv_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -225623,8 +219979,7 @@ async def index_otrs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225682,10 +220037,8 @@ async def index_otrs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225739,7 +220092,6 @@ async def index_otrs_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225788,8 +220140,7 @@ async def index_otrs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225847,10 +220198,8 @@ async def index_otrs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225904,7 +220253,6 @@ async def index_otrs_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225953,8 +220301,7 @@ async def index_otrs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -226012,10 +220359,8 @@ async def index_otrs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -226069,7 +220414,6 @@ async def index_otrs_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -226114,7 +220458,6 @@ def _index_otrs_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -226215,10 +220558,6 @@ def _index_otrs_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -226300,8 +220639,7 @@ async def index_owncloud_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -226359,10 +220697,8 @@ async def index_owncloud_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -226416,7 +220752,6 @@ async def index_owncloud_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -226465,8 +220800,7 @@ async def index_owncloud_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -226524,10 +220858,8 @@ async def index_owncloud_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -226581,7 +220913,6 @@ async def index_owncloud_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -226630,8 +220961,7 @@ async def index_owncloud_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -226689,10 +221019,8 @@ async def index_owncloud_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -226746,7 +221074,6 @@ async def index_owncloud_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -226791,7 +221118,6 @@ def _index_owncloud_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -226892,10 +221218,6 @@ def _index_owncloud_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -226977,8 +221299,7 @@ async def index_packetstorm_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227036,10 +221357,8 @@ async def index_packetstorm_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227093,7 +221412,6 @@ async def index_packetstorm_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227142,8 +221460,7 @@ async def index_packetstorm_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227201,10 +221518,8 @@ async def index_packetstorm_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227258,7 +221573,6 @@ async def index_packetstorm_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227307,8 +221621,7 @@ async def index_packetstorm_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227366,10 +221679,8 @@ async def index_packetstorm_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227423,7 +221734,6 @@ async def index_packetstorm_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227468,7 +221778,6 @@ def _index_packetstorm_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -227569,10 +221878,6 @@ def _index_packetstorm_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -227654,8 +221959,7 @@ async def index_palantir_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227713,10 +222017,8 @@ async def index_palantir_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227770,7 +222072,6 @@ async def index_palantir_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227819,8 +222120,7 @@ async def index_palantir_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227878,10 +222178,8 @@ async def index_palantir_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227935,7 +222233,6 @@ async def index_palantir_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227984,8 +222281,7 @@ async def index_palantir_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -228043,10 +222339,8 @@ async def index_palantir_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -228100,7 +222394,6 @@ async def index_palantir_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -228145,7 +222438,6 @@ def _index_palantir_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -228246,10 +222538,6 @@ def _index_palantir_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -228331,8 +222619,7 @@ async def index_palo_alto_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -228390,10 +222677,8 @@ async def index_palo_alto_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -228447,7 +222732,6 @@ async def index_palo_alto_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -228496,8 +222780,7 @@ async def index_palo_alto_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -228555,10 +222838,8 @@ async def index_palo_alto_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -228612,7 +222893,6 @@ async def index_palo_alto_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -228661,8 +222941,7 @@ async def index_palo_alto_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -228720,10 +222999,8 @@ async def index_palo_alto_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -228777,7 +223054,6 @@ async def index_palo_alto_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -228822,7 +223098,6 @@ def _index_palo_alto_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -228923,10 +223198,6 @@ def _index_palo_alto_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -229008,8 +223279,7 @@ async def index_panasonic_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229067,10 +223337,8 @@ async def index_panasonic_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229124,7 +223392,6 @@ async def index_panasonic_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -229173,8 +223440,7 @@ async def index_panasonic_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229232,10 +223498,8 @@ async def index_panasonic_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229289,7 +223553,6 @@ async def index_panasonic_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -229338,8 +223601,7 @@ async def index_panasonic_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229397,10 +223659,8 @@ async def index_panasonic_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229454,7 +223714,6 @@ async def index_panasonic_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -229499,7 +223758,6 @@ def _index_panasonic_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -229600,10 +223858,6 @@ def _index_panasonic_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -229685,8 +223939,7 @@ async def index_papercut_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229744,10 +223997,8 @@ async def index_papercut_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229801,7 +224052,6 @@ async def index_papercut_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -229850,8 +224100,7 @@ async def index_papercut_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229909,10 +224158,8 @@ async def index_papercut_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229966,7 +224213,6 @@ async def index_papercut_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230015,8 +224261,7 @@ async def index_papercut_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -230074,10 +224319,8 @@ async def index_papercut_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -230131,7 +224374,6 @@ async def index_papercut_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230176,7 +224418,6 @@ def _index_papercut_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -230277,10 +224518,6 @@ def _index_papercut_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -230362,8 +224599,7 @@ async def index_pega_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -230421,10 +224657,8 @@ async def index_pega_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -230478,7 +224712,6 @@ async def index_pega_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230527,8 +224760,7 @@ async def index_pega_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -230586,10 +224818,8 @@ async def index_pega_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -230643,7 +224873,6 @@ async def index_pega_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230692,8 +224921,7 @@ async def index_pega_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -230751,10 +224979,8 @@ async def index_pega_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -230808,7 +225034,6 @@ async def index_pega_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230853,7 +225078,6 @@ def _index_pega_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -230954,10 +225178,6 @@ def _index_pega_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -231039,8 +225259,7 @@ async def index_philips_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231098,10 +225317,8 @@ async def index_philips_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231155,7 +225372,6 @@ async def index_philips_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -231204,8 +225420,7 @@ async def index_philips_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231263,10 +225478,8 @@ async def index_philips_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231320,7 +225533,6 @@ async def index_philips_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -231369,8 +225581,7 @@ async def index_philips_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231428,10 +225639,8 @@ async def index_philips_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231485,7 +225694,6 @@ async def index_philips_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -231530,7 +225738,6 @@ def _index_philips_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -231631,10 +225838,6 @@ def _index_philips_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -231716,8 +225919,7 @@ async def index_phoenix_contact_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231775,10 +225977,8 @@ async def index_phoenix_contact_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231832,7 +226032,6 @@ async def index_phoenix_contact_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -231881,8 +226080,7 @@ async def index_phoenix_contact_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231940,10 +226138,8 @@ async def index_phoenix_contact_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231997,7 +226193,6 @@ async def index_phoenix_contact_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232046,8 +226241,7 @@ async def index_phoenix_contact_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -232105,10 +226299,8 @@ async def index_phoenix_contact_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -232162,7 +226354,6 @@ async def index_phoenix_contact_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232207,7 +226398,6 @@ def _index_phoenix_contact_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -232308,10 +226498,6 @@ def _index_phoenix_contact_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -232393,8 +226579,7 @@ async def index_php_my_admin_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -232452,10 +226637,8 @@ async def index_php_my_admin_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -232509,7 +226692,6 @@ async def index_php_my_admin_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232558,8 +226740,7 @@ async def index_php_my_admin_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -232617,10 +226798,8 @@ async def index_php_my_admin_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -232674,7 +226853,6 @@ async def index_php_my_admin_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232723,8 +226901,7 @@ async def index_php_my_admin_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -232782,10 +226959,8 @@ async def index_php_my_admin_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -232839,7 +227014,6 @@ async def index_php_my_admin_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232884,7 +227058,6 @@ def _index_php_my_admin_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -232985,10 +227158,6 @@ def _index_php_my_admin_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -233070,8 +227239,7 @@ async def index_pkcert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233129,10 +227297,8 @@ async def index_pkcert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -233186,7 +227352,6 @@ async def index_pkcert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -233235,8 +227400,7 @@ async def index_pkcert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233294,10 +227458,8 @@ async def index_pkcert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -233351,7 +227513,6 @@ async def index_pkcert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -233400,8 +227561,7 @@ async def index_pkcert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233459,10 +227619,8 @@ async def index_pkcert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -233516,7 +227674,6 @@ async def index_pkcert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -233561,7 +227718,6 @@ def _index_pkcert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -233662,10 +227818,6 @@ def _index_pkcert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -233747,8 +227899,7 @@ async def index_postgressql_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233806,10 +227957,8 @@ async def index_postgressql_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -233863,7 +228012,6 @@ async def index_postgressql_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -233912,8 +228060,7 @@ async def index_postgressql_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233971,10 +228118,8 @@ async def index_postgressql_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234028,7 +228173,6 @@ async def index_postgressql_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234077,8 +228221,7 @@ async def index_postgressql_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -234136,10 +228279,8 @@ async def index_postgressql_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234193,7 +228334,6 @@ async def index_postgressql_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234238,7 +228378,6 @@ def _index_postgressql_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -234339,10 +228478,6 @@ def _index_postgressql_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -234424,8 +228559,7 @@ async def index_powerdns_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -234483,10 +228617,8 @@ async def index_powerdns_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234540,7 +228672,6 @@ async def index_powerdns_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234589,8 +228720,7 @@ async def index_powerdns_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -234648,10 +228778,8 @@ async def index_powerdns_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234705,7 +228833,6 @@ async def index_powerdns_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234754,8 +228881,7 @@ async def index_powerdns_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -234813,10 +228939,8 @@ async def index_powerdns_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234870,7 +228994,6 @@ async def index_powerdns_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234915,7 +229038,6 @@ def _index_powerdns_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -235016,10 +229138,6 @@ def _index_powerdns_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -235101,8 +229219,7 @@ async def index_progress_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235160,10 +229277,8 @@ async def index_progress_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -235217,7 +229332,6 @@ async def index_progress_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -235266,8 +229380,7 @@ async def index_progress_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235325,10 +229438,8 @@ async def index_progress_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -235382,7 +229493,6 @@ async def index_progress_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -235431,8 +229541,7 @@ async def index_progress_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235490,10 +229599,8 @@ async def index_progress_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -235547,7 +229654,6 @@ async def index_progress_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -235592,7 +229698,6 @@ def _index_progress_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -235693,10 +229798,6 @@ def _index_progress_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -235778,8 +229879,7 @@ async def index_proofpoint_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235837,10 +229937,8 @@ async def index_proofpoint_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -235894,7 +229992,6 @@ async def index_proofpoint_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -235943,8 +230040,7 @@ async def index_proofpoint_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236002,10 +230098,8 @@ async def index_proofpoint_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236059,7 +230153,6 @@ async def index_proofpoint_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236108,8 +230201,7 @@ async def index_proofpoint_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236167,10 +230259,8 @@ async def index_proofpoint_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236224,7 +230314,6 @@ async def index_proofpoint_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236269,7 +230358,6 @@ def _index_proofpoint_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -236370,10 +230458,6 @@ def _index_proofpoint_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -236455,8 +230539,7 @@ async def index_ptc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236514,10 +230597,8 @@ async def index_ptc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236571,7 +230652,6 @@ async def index_ptc_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236620,8 +230700,7 @@ async def index_ptc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236679,10 +230758,8 @@ async def index_ptc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236736,7 +230813,6 @@ async def index_ptc_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236785,8 +230861,7 @@ async def index_ptc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236844,10 +230919,8 @@ async def index_ptc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236901,7 +230974,6 @@ async def index_ptc_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236946,7 +231018,6 @@ def _index_ptc_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -237047,10 +231118,6 @@ def _index_ptc_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -237132,8 +231199,7 @@ async def index_pub_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237191,10 +231257,8 @@ async def index_pub_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -237248,7 +231312,6 @@ async def index_pub_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -237297,8 +231360,7 @@ async def index_pub_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237356,10 +231418,8 @@ async def index_pub_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -237413,7 +231473,6 @@ async def index_pub_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -237462,8 +231521,7 @@ async def index_pub_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237521,10 +231579,8 @@ async def index_pub_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -237578,7 +231634,6 @@ async def index_pub_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -237623,7 +231678,6 @@ def _index_pub_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -237724,10 +231778,6 @@ def _index_pub_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -237809,8 +231859,7 @@ async def index_pure_storage_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237868,10 +231917,8 @@ async def index_pure_storage_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -237925,7 +231972,6 @@ async def index_pure_storage_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -237974,8 +232020,7 @@ async def index_pure_storage_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238033,10 +232078,8 @@ async def index_pure_storage_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238090,7 +232133,6 @@ async def index_pure_storage_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238139,8 +232181,7 @@ async def index_pure_storage_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238198,10 +232239,8 @@ async def index_pure_storage_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238255,7 +232294,6 @@ async def index_pure_storage_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238300,7 +232338,6 @@ def _index_pure_storage_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -238401,10 +232438,6 @@ def _index_pure_storage_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -238486,8 +232519,7 @@ async def index_pypa_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238545,10 +232577,8 @@ async def index_pypa_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238602,7 +232632,6 @@ async def index_pypa_advisories_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238651,8 +232680,7 @@ async def index_pypa_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238710,10 +232738,8 @@ async def index_pypa_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238767,7 +232793,6 @@ async def index_pypa_advisories_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238816,8 +232841,7 @@ async def index_pypa_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238875,10 +232899,8 @@ async def index_pypa_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238932,7 +232954,6 @@ async def index_pypa_advisories_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238977,7 +232998,6 @@ def _index_pypa_advisories_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -239078,10 +233098,6 @@ def _index_pypa_advisories_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -239163,8 +233179,7 @@ async def index_pypi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -239222,10 +233237,8 @@ async def index_pypi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -239279,7 +233292,6 @@ async def index_pypi_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -239328,8 +233340,7 @@ async def index_pypi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -239387,10 +233398,8 @@ async def index_pypi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -239444,7 +233453,6 @@ async def index_pypi_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -239493,8 +233501,7 @@ async def index_pypi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -239552,10 +233559,8 @@ async def index_pypi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -239609,7 +233614,6 @@ async def index_pypi_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -239654,7 +233658,6 @@ def _index_pypi_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -239755,10 +233758,6 @@ def _index_pypi_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -239840,8 +233839,7 @@ async def index_qnap_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -239899,10 +233897,8 @@ async def index_qnap_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -239956,7 +233952,6 @@ async def index_qnap_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240005,8 +234000,7 @@ async def index_qnap_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240064,10 +234058,8 @@ async def index_qnap_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240121,7 +234113,6 @@ async def index_qnap_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240170,8 +234161,7 @@ async def index_qnap_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240229,10 +234219,8 @@ async def index_qnap_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240286,7 +234274,6 @@ async def index_qnap_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240331,7 +234318,6 @@ def _index_qnap_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -240432,10 +234418,6 @@ def _index_qnap_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -240517,8 +234499,7 @@ async def index_qqids_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240576,10 +234557,8 @@ async def index_qqids_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240633,7 +234612,6 @@ async def index_qqids_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240682,8 +234660,7 @@ async def index_qqids_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240741,10 +234718,8 @@ async def index_qqids_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240798,7 +234773,6 @@ async def index_qqids_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240847,8 +234821,7 @@ async def index_qqids_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240906,10 +234879,8 @@ async def index_qqids_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240963,7 +234934,6 @@ async def index_qqids_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -241008,7 +234978,6 @@ def _index_qqids_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -241109,10 +235078,6 @@ def _index_qqids_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -241194,8 +235159,7 @@ async def index_qualcomm_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -241253,10 +235217,8 @@ async def index_qualcomm_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -241310,7 +235272,6 @@ async def index_qualcomm_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -241359,8 +235320,7 @@ async def index_qualcomm_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -241418,10 +235378,8 @@ async def index_qualcomm_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -241475,7 +235433,6 @@ async def index_qualcomm_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -241524,8 +235481,7 @@ async def index_qualcomm_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -241583,10 +235539,8 @@ async def index_qualcomm_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -241640,7 +235594,6 @@ async def index_qualcomm_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -241685,7 +235638,6 @@ def _index_qualcomm_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -241786,10 +235738,6 @@ def _index_qualcomm_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -241871,8 +235819,7 @@ async def index_qualys_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -241930,10 +235877,8 @@ async def index_qualys_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -241987,7 +235932,6 @@ async def index_qualys_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242036,8 +235980,7 @@ async def index_qualys_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242095,10 +236038,8 @@ async def index_qualys_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242152,7 +236093,6 @@ async def index_qualys_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242201,8 +236141,7 @@ async def index_qualys_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242260,10 +236199,8 @@ async def index_qualys_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242317,7 +236254,6 @@ async def index_qualys_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242362,7 +236298,6 @@ def _index_qualys_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -242463,10 +236398,6 @@ def _index_qualys_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -242548,8 +236479,7 @@ async def index_qualys_qids_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242607,10 +236537,8 @@ async def index_qualys_qids_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242664,7 +236592,6 @@ async def index_qualys_qids_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242713,8 +236640,7 @@ async def index_qualys_qids_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242772,10 +236698,8 @@ async def index_qualys_qids_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242829,7 +236753,6 @@ async def index_qualys_qids_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242878,8 +236801,7 @@ async def index_qualys_qids_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242937,10 +236859,8 @@ async def index_qualys_qids_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242994,7 +236914,6 @@ async def index_qualys_qids_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -243039,7 +236958,6 @@ def _index_qualys_qids_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -243140,10 +237058,6 @@ def _index_qualys_qids_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -243225,8 +237139,7 @@ async def index_qubes_qsb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -243284,10 +237197,8 @@ async def index_qubes_qsb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -243341,7 +237252,6 @@ async def index_qubes_qsb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -243390,8 +237300,7 @@ async def index_qubes_qsb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -243449,10 +237358,8 @@ async def index_qubes_qsb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -243506,7 +237413,6 @@ async def index_qubes_qsb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -243555,8 +237461,7 @@ async def index_qubes_qsb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -243614,10 +237519,8 @@ async def index_qubes_qsb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -243671,7 +237574,6 @@ async def index_qubes_qsb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -243716,7 +237618,6 @@ def _index_qubes_qsb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -243817,10 +237718,6 @@ def _index_qubes_qsb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -243902,8 +237799,7 @@ async def index_ransomware_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -243961,10 +237857,8 @@ async def index_ransomware_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244018,7 +237912,6 @@ async def index_ransomware_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244067,8 +237960,7 @@ async def index_ransomware_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244126,10 +238018,8 @@ async def index_ransomware_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244183,7 +238073,6 @@ async def index_ransomware_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244232,8 +238121,7 @@ async def index_ransomware_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244291,10 +238179,8 @@ async def index_ransomware_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244348,7 +238234,6 @@ async def index_ransomware_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244393,7 +238278,6 @@ def _index_ransomware_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -244494,10 +238378,6 @@ def _index_ransomware_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -244579,8 +238459,7 @@ async def index_red_lion_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244638,10 +238517,8 @@ async def index_red_lion_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244695,7 +238572,6 @@ async def index_red_lion_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244744,8 +238620,7 @@ async def index_red_lion_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244803,10 +238678,8 @@ async def index_red_lion_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244860,7 +238733,6 @@ async def index_red_lion_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244909,8 +238781,7 @@ async def index_red_lion_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244968,10 +238839,8 @@ async def index_red_lion_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -245025,7 +238894,6 @@ async def index_red_lion_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -245070,7 +238938,6 @@ def _index_red_lion_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -245171,10 +239038,6 @@ def _index_red_lion_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -245256,8 +239119,7 @@ async def index_redhat_cves_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -245315,10 +239177,8 @@ async def index_redhat_cves_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -245372,7 +239232,6 @@ async def index_redhat_cves_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -245421,8 +239280,7 @@ async def index_redhat_cves_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -245480,10 +239338,8 @@ async def index_redhat_cves_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -245537,7 +239393,6 @@ async def index_redhat_cves_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -245586,8 +239441,7 @@ async def index_redhat_cves_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -245645,10 +239499,8 @@ async def index_redhat_cves_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -245702,7 +239554,6 @@ async def index_redhat_cves_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -245747,7 +239598,6 @@ def _index_redhat_cves_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -245848,10 +239698,6 @@ def _index_redhat_cves_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -245933,8 +239779,7 @@ async def index_redhat_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -245992,10 +239837,8 @@ async def index_redhat_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246049,7 +239892,6 @@ async def index_redhat_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246098,8 +239940,7 @@ async def index_redhat_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246157,10 +239998,8 @@ async def index_redhat_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246214,7 +240053,6 @@ async def index_redhat_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246263,8 +240101,7 @@ async def index_redhat_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246322,10 +240159,8 @@ async def index_redhat_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246379,7 +240214,6 @@ async def index_redhat_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246424,7 +240258,6 @@ def _index_redhat_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -246525,10 +240358,6 @@ def _index_redhat_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -246610,8 +240439,7 @@ async def index_renesas_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246669,10 +240497,8 @@ async def index_renesas_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246726,7 +240552,6 @@ async def index_renesas_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246775,8 +240600,7 @@ async def index_renesas_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246834,10 +240658,8 @@ async def index_renesas_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246891,7 +240713,6 @@ async def index_renesas_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246940,8 +240761,7 @@ async def index_renesas_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246999,10 +240819,8 @@ async def index_renesas_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -247056,7 +240874,6 @@ async def index_renesas_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -247101,7 +240918,6 @@ def _index_renesas_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -247202,10 +241018,6 @@ def _index_renesas_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -247287,8 +241099,7 @@ async def index_revive_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -247346,10 +241157,8 @@ async def index_revive_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -247403,7 +241212,6 @@ async def index_revive_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -247452,8 +241260,7 @@ async def index_revive_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -247511,10 +241318,8 @@ async def index_revive_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -247568,7 +241373,6 @@ async def index_revive_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -247617,8 +241421,7 @@ async def index_revive_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -247676,10 +241479,8 @@ async def index_revive_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -247733,7 +241534,6 @@ async def index_revive_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -247778,7 +241578,6 @@ def _index_revive_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -247879,10 +241678,6 @@ def _index_revive_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -247964,8 +241759,7 @@ async def index_roche_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248023,10 +241817,8 @@ async def index_roche_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248080,7 +241872,6 @@ async def index_roche_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248129,8 +241920,7 @@ async def index_roche_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248188,10 +241978,8 @@ async def index_roche_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248245,7 +242033,6 @@ async def index_roche_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248294,8 +242081,7 @@ async def index_roche_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248353,10 +242139,8 @@ async def index_roche_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248410,7 +242194,6 @@ async def index_roche_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248455,7 +242238,6 @@ def _index_roche_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -248556,10 +242338,6 @@ def _index_roche_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -248641,8 +242419,7 @@ async def index_rockwell_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248700,10 +242477,8 @@ async def index_rockwell_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248757,7 +242532,6 @@ async def index_rockwell_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248806,8 +242580,7 @@ async def index_rockwell_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248865,10 +242638,8 @@ async def index_rockwell_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248922,7 +242693,6 @@ async def index_rockwell_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248971,8 +242741,7 @@ async def index_rockwell_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -249030,10 +242799,8 @@ async def index_rockwell_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -249087,7 +242854,6 @@ async def index_rockwell_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -249132,7 +242898,6 @@ def _index_rockwell_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -249233,10 +242998,6 @@ def _index_rockwell_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -249318,8 +243079,7 @@ async def index_rocky_errata_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -249377,10 +243137,8 @@ async def index_rocky_errata_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -249434,7 +243192,6 @@ async def index_rocky_errata_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -249483,8 +243240,7 @@ async def index_rocky_errata_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -249542,10 +243298,8 @@ async def index_rocky_errata_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -249599,7 +243353,6 @@ async def index_rocky_errata_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -249648,8 +243401,7 @@ async def index_rocky_errata_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -249707,10 +243459,8 @@ async def index_rocky_errata_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -249764,7 +243514,6 @@ async def index_rocky_errata_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -249809,7 +243558,6 @@ def _index_rocky_errata_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -249910,10 +243658,6 @@ def _index_rocky_errata_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -249995,8 +243739,7 @@ async def index_rocky_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250054,10 +243797,8 @@ async def index_rocky_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250111,7 +243852,6 @@ async def index_rocky_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -250160,8 +243900,7 @@ async def index_rocky_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250219,10 +243958,8 @@ async def index_rocky_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250276,7 +244013,6 @@ async def index_rocky_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -250325,8 +244061,7 @@ async def index_rocky_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250384,10 +244119,8 @@ async def index_rocky_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250441,7 +244174,6 @@ async def index_rocky_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -250486,7 +244218,6 @@ def _index_rocky_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -250587,10 +244318,6 @@ def _index_rocky_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -250672,8 +244399,7 @@ async def index_rocky_purls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250731,10 +244457,8 @@ async def index_rocky_purls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250788,7 +244512,6 @@ async def index_rocky_purls_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -250837,8 +244560,7 @@ async def index_rocky_purls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250896,10 +244618,8 @@ async def index_rocky_purls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250953,7 +244673,6 @@ async def index_rocky_purls_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251002,8 +244721,7 @@ async def index_rocky_purls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -251061,10 +244779,8 @@ async def index_rocky_purls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -251118,7 +244834,6 @@ async def index_rocky_purls_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251163,7 +244878,6 @@ def _index_rocky_purls_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -251264,10 +244978,6 @@ def _index_rocky_purls_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -251349,8 +245059,7 @@ async def index_rsync_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -251408,10 +245117,8 @@ async def index_rsync_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -251465,7 +245172,6 @@ async def index_rsync_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251514,8 +245220,7 @@ async def index_rsync_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -251573,10 +245278,8 @@ async def index_rsync_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -251630,7 +245333,6 @@ async def index_rsync_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251679,8 +245381,7 @@ async def index_rsync_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -251738,10 +245439,8 @@ async def index_rsync_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -251795,7 +245494,6 @@ async def index_rsync_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251840,7 +245538,6 @@ def _index_rsync_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -251941,10 +245638,6 @@ def _index_rsync_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -252026,8 +245719,7 @@ async def index_ruckus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252085,10 +245777,8 @@ async def index_ruckus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252142,7 +245832,6 @@ async def index_ruckus_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -252191,8 +245880,7 @@ async def index_ruckus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252250,10 +245938,8 @@ async def index_ruckus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252307,7 +245993,6 @@ async def index_ruckus_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -252356,8 +246041,7 @@ async def index_ruckus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252415,10 +246099,8 @@ async def index_ruckus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252472,7 +246154,6 @@ async def index_ruckus_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -252517,7 +246198,6 @@ def _index_ruckus_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -252618,10 +246298,6 @@ def _index_ruckus_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -252703,8 +246379,7 @@ async def index_rustsec_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252762,10 +246437,8 @@ async def index_rustsec_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252819,7 +246492,6 @@ async def index_rustsec_advisories_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -252868,8 +246540,7 @@ async def index_rustsec_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252927,10 +246598,8 @@ async def index_rustsec_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252984,7 +246653,6 @@ async def index_rustsec_advisories_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253033,8 +246701,7 @@ async def index_rustsec_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -253092,10 +246759,8 @@ async def index_rustsec_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -253149,7 +246814,6 @@ async def index_rustsec_advisories_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253194,7 +246858,6 @@ def _index_rustsec_advisories_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -253295,10 +246958,6 @@ def _index_rustsec_advisories_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -253380,8 +247039,7 @@ async def index_sacert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -253439,10 +247097,8 @@ async def index_sacert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -253496,7 +247152,6 @@ async def index_sacert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253545,8 +247200,7 @@ async def index_sacert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -253604,10 +247258,8 @@ async def index_sacert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -253661,7 +247313,6 @@ async def index_sacert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253710,8 +247361,7 @@ async def index_sacert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -253769,10 +247419,8 @@ async def index_sacert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -253826,7 +247474,6 @@ async def index_sacert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253871,7 +247518,6 @@ def _index_sacert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -253972,10 +247618,6 @@ def _index_sacert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -254057,8 +247699,7 @@ async def index_safran_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254116,10 +247757,8 @@ async def index_safran_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -254173,7 +247812,6 @@ async def index_safran_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -254222,8 +247860,7 @@ async def index_safran_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254281,10 +247918,8 @@ async def index_safran_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -254338,7 +247973,6 @@ async def index_safran_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -254387,8 +248021,7 @@ async def index_safran_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254446,10 +248079,8 @@ async def index_safran_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -254503,7 +248134,6 @@ async def index_safran_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -254548,7 +248178,6 @@ def _index_safran_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -254649,10 +248278,6 @@ def _index_safran_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -254734,8 +248359,7 @@ async def index_saint_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254793,10 +248417,8 @@ async def index_saint_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -254850,7 +248472,6 @@ async def index_saint_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -254899,8 +248520,7 @@ async def index_saint_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254958,10 +248578,8 @@ async def index_saint_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255015,7 +248633,6 @@ async def index_saint_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255064,8 +248681,7 @@ async def index_saint_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -255123,10 +248739,8 @@ async def index_saint_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255180,7 +248794,6 @@ async def index_saint_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255225,7 +248838,6 @@ def _index_saint_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -255326,10 +248938,6 @@ def _index_saint_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -255411,8 +249019,7 @@ async def index_salesforce_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -255470,10 +249077,8 @@ async def index_salesforce_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255527,7 +249132,6 @@ async def index_salesforce_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255576,8 +249180,7 @@ async def index_salesforce_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -255635,10 +249238,8 @@ async def index_salesforce_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255692,7 +249293,6 @@ async def index_salesforce_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255741,8 +249341,7 @@ async def index_salesforce_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -255800,10 +249399,8 @@ async def index_salesforce_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255857,7 +249454,6 @@ async def index_salesforce_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255902,7 +249498,6 @@ def _index_salesforce_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -256003,10 +249598,6 @@ def _index_salesforce_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -256088,8 +249679,7 @@ async def index_samba_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256147,10 +249737,8 @@ async def index_samba_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -256204,7 +249792,6 @@ async def index_samba_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -256253,8 +249840,7 @@ async def index_samba_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256312,10 +249898,8 @@ async def index_samba_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -256369,7 +249953,6 @@ async def index_samba_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -256418,8 +250001,7 @@ async def index_samba_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256477,10 +250059,8 @@ async def index_samba_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -256534,7 +250114,6 @@ async def index_samba_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -256579,7 +250158,6 @@ def _index_samba_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -256680,10 +250258,6 @@ def _index_samba_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -256765,8 +250339,7 @@ async def index_sandisk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256824,10 +250397,8 @@ async def index_sandisk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -256881,7 +250452,6 @@ async def index_sandisk_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -256930,8 +250500,7 @@ async def index_sandisk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256989,10 +250558,8 @@ async def index_sandisk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257046,7 +250613,6 @@ async def index_sandisk_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257095,8 +250661,7 @@ async def index_sandisk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -257154,10 +250719,8 @@ async def index_sandisk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257211,7 +250774,6 @@ async def index_sandisk_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257256,7 +250818,6 @@ def _index_sandisk_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -257357,10 +250918,6 @@ def _index_sandisk_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -257442,8 +250999,7 @@ async def index_sans_dshield_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -257501,10 +251057,8 @@ async def index_sans_dshield_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257558,7 +251112,6 @@ async def index_sans_dshield_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257607,8 +251160,7 @@ async def index_sans_dshield_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -257666,10 +251218,8 @@ async def index_sans_dshield_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257723,7 +251273,6 @@ async def index_sans_dshield_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257772,8 +251321,7 @@ async def index_sans_dshield_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -257831,10 +251379,8 @@ async def index_sans_dshield_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257888,7 +251434,6 @@ async def index_sans_dshield_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257933,7 +251478,6 @@ def _index_sans_dshield_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -258034,10 +251578,6 @@ def _index_sans_dshield_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -258119,8 +251659,7 @@ async def index_sap_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258178,10 +251717,8 @@ async def index_sap_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -258235,7 +251772,6 @@ async def index_sap_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -258284,8 +251820,7 @@ async def index_sap_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258343,10 +251878,8 @@ async def index_sap_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -258400,7 +251933,6 @@ async def index_sap_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -258449,8 +251981,7 @@ async def index_sap_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258508,10 +252039,8 @@ async def index_sap_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -258565,7 +252094,6 @@ async def index_sap_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -258610,7 +252138,6 @@ def _index_sap_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -258711,10 +252238,6 @@ def _index_sap_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -258796,8 +252319,7 @@ async def index_schneider_electric_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258855,10 +252377,8 @@ async def index_schneider_electric_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -258912,7 +252432,6 @@ async def index_schneider_electric_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -258961,8 +252480,7 @@ async def index_schneider_electric_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259020,10 +252538,8 @@ async def index_schneider_electric_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259077,7 +252593,6 @@ async def index_schneider_electric_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259126,8 +252641,7 @@ async def index_schneider_electric_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259185,10 +252699,8 @@ async def index_schneider_electric_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259242,7 +252754,6 @@ async def index_schneider_electric_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259287,7 +252798,6 @@ def _index_schneider_electric_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -259388,10 +252898,6 @@ def _index_schneider_electric_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -259473,8 +252979,7 @@ async def index_schutzwerk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259532,10 +253037,8 @@ async def index_schutzwerk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259589,7 +253092,6 @@ async def index_schutzwerk_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259638,8 +253140,7 @@ async def index_schutzwerk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259697,10 +253198,8 @@ async def index_schutzwerk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259754,7 +253253,6 @@ async def index_schutzwerk_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259803,8 +253301,7 @@ async def index_schutzwerk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259862,10 +253359,8 @@ async def index_schutzwerk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259919,7 +253414,6 @@ async def index_schutzwerk_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259964,7 +253458,6 @@ def _index_schutzwerk_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -260065,10 +253558,6 @@ def _index_schutzwerk_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -260150,8 +253639,7 @@ async def index_sec_consult_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -260209,10 +253697,8 @@ async def index_sec_consult_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -260266,7 +253752,6 @@ async def index_sec_consult_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -260315,8 +253800,7 @@ async def index_sec_consult_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -260374,10 +253858,8 @@ async def index_sec_consult_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -260431,7 +253913,6 @@ async def index_sec_consult_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -260480,8 +253961,7 @@ async def index_sec_consult_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -260539,10 +254019,8 @@ async def index_sec_consult_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -260596,7 +254074,6 @@ async def index_sec_consult_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -260641,7 +254118,6 @@ def _index_sec_consult_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -260742,10 +254218,6 @@ def _index_sec_consult_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -260827,8 +254299,7 @@ async def index_securitylab_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -260886,10 +254357,8 @@ async def index_securitylab_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -260943,7 +254412,6 @@ async def index_securitylab_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -260992,8 +254460,7 @@ async def index_securitylab_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261051,10 +254518,8 @@ async def index_securitylab_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261108,7 +254573,6 @@ async def index_securitylab_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261157,8 +254621,7 @@ async def index_securitylab_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261216,10 +254679,8 @@ async def index_securitylab_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261273,7 +254734,6 @@ async def index_securitylab_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261318,7 +254778,6 @@ def _index_securitylab_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -261419,10 +254878,6 @@ def _index_securitylab_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -261504,8 +254959,7 @@ async def index_seebug_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261563,10 +255017,8 @@ async def index_seebug_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261620,7 +255072,6 @@ async def index_seebug_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261669,8 +255120,7 @@ async def index_seebug_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261728,10 +255178,8 @@ async def index_seebug_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261785,7 +255233,6 @@ async def index_seebug_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261834,8 +255281,7 @@ async def index_seebug_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261893,10 +255339,8 @@ async def index_seebug_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261950,7 +255394,6 @@ async def index_seebug_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261995,7 +255438,6 @@ def _index_seebug_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -262096,10 +255538,6 @@ def _index_seebug_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -262181,8 +255619,7 @@ async def index_sel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -262240,10 +255677,8 @@ async def index_sel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -262297,7 +255732,6 @@ async def index_sel_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -262346,8 +255780,7 @@ async def index_sel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -262405,10 +255838,8 @@ async def index_sel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -262462,7 +255893,6 @@ async def index_sel_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -262511,8 +255941,7 @@ async def index_sel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -262570,10 +255999,8 @@ async def index_sel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -262627,7 +256054,6 @@ async def index_sel_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -262672,7 +256098,6 @@ def _index_sel_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -262773,10 +256198,6 @@ def _index_sel_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -262858,8 +256279,7 @@ async def index_sentinelone_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -262917,10 +256337,8 @@ async def index_sentinelone_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -262974,7 +256392,6 @@ async def index_sentinelone_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263023,8 +256440,7 @@ async def index_sentinelone_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263082,10 +256498,8 @@ async def index_sentinelone_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263139,7 +256553,6 @@ async def index_sentinelone_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263188,8 +256601,7 @@ async def index_sentinelone_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263247,10 +256659,8 @@ async def index_sentinelone_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263304,7 +256714,6 @@ async def index_sentinelone_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263349,7 +256758,6 @@ def _index_sentinelone_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -263450,10 +256858,6 @@ def _index_sentinelone_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -263535,8 +256939,7 @@ async def index_servicenow_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263594,10 +256997,8 @@ async def index_servicenow_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263651,7 +257052,6 @@ async def index_servicenow_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263700,8 +257100,7 @@ async def index_servicenow_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263759,10 +257158,8 @@ async def index_servicenow_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263816,7 +257213,6 @@ async def index_servicenow_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263865,8 +257261,7 @@ async def index_servicenow_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263924,10 +257319,8 @@ async def index_servicenow_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263981,7 +257374,6 @@ async def index_servicenow_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -264026,7 +257418,6 @@ def _index_servicenow_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -264127,10 +257518,6 @@ def _index_servicenow_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -264212,8 +257599,7 @@ async def index_shadowserver_exploited_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -264271,10 +257657,8 @@ async def index_shadowserver_exploited_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -264328,7 +257712,6 @@ async def index_shadowserver_exploited_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -264377,8 +257760,7 @@ async def index_shadowserver_exploited_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -264436,10 +257818,8 @@ async def index_shadowserver_exploited_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -264493,7 +257873,6 @@ async def index_shadowserver_exploited_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -264542,8 +257921,7 @@ async def index_shadowserver_exploited_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -264601,10 +257979,8 @@ async def index_shadowserver_exploited_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -264658,7 +258034,6 @@ async def index_shadowserver_exploited_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -264703,7 +258078,6 @@ def _index_shadowserver_exploited_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -264804,10 +258178,6 @@ def _index_shadowserver_exploited_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -264889,8 +258259,7 @@ async def index_shielder_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -264948,10 +258317,8 @@ async def index_shielder_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265005,7 +258372,6 @@ async def index_shielder_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265054,8 +258420,7 @@ async def index_shielder_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265113,10 +258478,8 @@ async def index_shielder_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265170,7 +258533,6 @@ async def index_shielder_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265219,8 +258581,7 @@ async def index_shielder_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265278,10 +258639,8 @@ async def index_shielder_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265335,7 +258694,6 @@ async def index_shielder_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265380,7 +258738,6 @@ def _index_shielder_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -265481,10 +258838,6 @@ def _index_shielder_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -265566,8 +258919,7 @@ async def index_sick_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265625,10 +258977,8 @@ async def index_sick_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265682,7 +259032,6 @@ async def index_sick_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265731,8 +259080,7 @@ async def index_sick_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265790,10 +259138,8 @@ async def index_sick_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265847,7 +259193,6 @@ async def index_sick_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265896,8 +259241,7 @@ async def index_sick_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265955,10 +259299,8 @@ async def index_sick_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -266012,7 +259354,6 @@ async def index_sick_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -266057,7 +259398,6 @@ def _index_sick_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -266158,10 +259498,6 @@ def _index_sick_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -266243,8 +259579,7 @@ async def index_siemens_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -266302,10 +259637,8 @@ async def index_siemens_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -266359,7 +259692,6 @@ async def index_siemens_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -266408,8 +259740,7 @@ async def index_siemens_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -266467,10 +259798,8 @@ async def index_siemens_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -266524,7 +259853,6 @@ async def index_siemens_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -266573,8 +259901,7 @@ async def index_siemens_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -266632,10 +259959,8 @@ async def index_siemens_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -266689,7 +260014,6 @@ async def index_siemens_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -266734,7 +260058,6 @@ def _index_siemens_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -266835,10 +260158,6 @@ def _index_siemens_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -266920,8 +260239,7 @@ async def index_sierra_wireless_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -266979,10 +260297,8 @@ async def index_sierra_wireless_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267036,7 +260352,6 @@ async def index_sierra_wireless_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267085,8 +260400,7 @@ async def index_sierra_wireless_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267144,10 +260458,8 @@ async def index_sierra_wireless_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267201,7 +260513,6 @@ async def index_sierra_wireless_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267250,8 +260561,7 @@ async def index_sierra_wireless_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267309,10 +260619,8 @@ async def index_sierra_wireless_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267366,7 +260674,6 @@ async def index_sierra_wireless_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267411,7 +260718,6 @@ def _index_sierra_wireless_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -267512,10 +260818,6 @@ def _index_sierra_wireless_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -267597,8 +260899,7 @@ async def index_sigmahq_sigma_rules_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267656,10 +260957,8 @@ async def index_sigmahq_sigma_rules_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267713,7 +261012,6 @@ async def index_sigmahq_sigma_rules_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267762,8 +261060,7 @@ async def index_sigmahq_sigma_rules_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267821,10 +261118,8 @@ async def index_sigmahq_sigma_rules_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267878,7 +261173,6 @@ async def index_sigmahq_sigma_rules_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267927,8 +261221,7 @@ async def index_sigmahq_sigma_rules_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267986,10 +261279,8 @@ async def index_sigmahq_sigma_rules_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -268043,7 +261334,6 @@ async def index_sigmahq_sigma_rules_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -268088,7 +261378,6 @@ def _index_sigmahq_sigma_rules_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -268189,10 +261478,6 @@ def _index_sigmahq_sigma_rules_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -268274,8 +261559,7 @@ async def index_singcert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -268333,10 +261617,8 @@ async def index_singcert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -268390,7 +261672,6 @@ async def index_singcert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -268439,8 +261720,7 @@ async def index_singcert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -268498,10 +261778,8 @@ async def index_singcert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -268555,7 +261833,6 @@ async def index_singcert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -268604,8 +261881,7 @@ async def index_singcert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -268663,10 +261939,8 @@ async def index_singcert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -268720,7 +261994,6 @@ async def index_singcert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -268765,7 +262038,6 @@ def _index_singcert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -268866,10 +262138,6 @@ def _index_singcert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -268951,8 +262219,7 @@ async def index_sitecore_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269010,10 +262277,8 @@ async def index_sitecore_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269067,7 +262332,6 @@ async def index_sitecore_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269116,8 +262380,7 @@ async def index_sitecore_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269175,10 +262438,8 @@ async def index_sitecore_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269232,7 +262493,6 @@ async def index_sitecore_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269281,8 +262541,7 @@ async def index_sitecore_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269340,10 +262599,8 @@ async def index_sitecore_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269397,7 +262654,6 @@ async def index_sitecore_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269442,7 +262698,6 @@ def _index_sitecore_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -269543,10 +262798,6 @@ def _index_sitecore_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -269628,8 +262879,7 @@ async def index_slackware_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269687,10 +262937,8 @@ async def index_slackware_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269744,7 +262992,6 @@ async def index_slackware_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269793,8 +263040,7 @@ async def index_slackware_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269852,10 +263098,8 @@ async def index_slackware_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269909,7 +263153,6 @@ async def index_slackware_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269958,8 +263201,7 @@ async def index_slackware_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -270017,10 +263259,8 @@ async def index_slackware_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -270074,7 +263314,6 @@ async def index_slackware_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -270119,7 +263358,6 @@ def _index_slackware_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -270220,10 +263458,6 @@ def _index_slackware_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -270305,8 +263539,7 @@ async def index_solarwinds_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -270364,10 +263597,8 @@ async def index_solarwinds_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -270421,7 +263652,6 @@ async def index_solarwinds_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -270470,8 +263700,7 @@ async def index_solarwinds_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -270529,10 +263758,8 @@ async def index_solarwinds_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -270586,7 +263813,6 @@ async def index_solarwinds_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -270635,8 +263861,7 @@ async def index_solarwinds_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -270694,10 +263919,8 @@ async def index_solarwinds_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -270751,7 +263974,6 @@ async def index_solarwinds_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -270796,7 +264018,6 @@ def _index_solarwinds_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -270897,10 +264118,6 @@ def _index_solarwinds_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -270982,8 +264199,7 @@ async def index_solr_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271041,10 +264257,8 @@ async def index_solr_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271098,7 +264312,6 @@ async def index_solr_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271147,8 +264360,7 @@ async def index_solr_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271206,10 +264418,8 @@ async def index_solr_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271263,7 +264473,6 @@ async def index_solr_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271312,8 +264521,7 @@ async def index_solr_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271371,10 +264579,8 @@ async def index_solr_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271428,7 +264634,6 @@ async def index_solr_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271473,7 +264678,6 @@ def _index_solr_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -271574,10 +264778,6 @@ def _index_solr_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -271659,8 +264859,7 @@ async def index_sonatype_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271718,10 +264917,8 @@ async def index_sonatype_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271775,7 +264972,6 @@ async def index_sonatype_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271824,8 +265020,7 @@ async def index_sonatype_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271883,10 +265078,8 @@ async def index_sonatype_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271940,7 +265133,6 @@ async def index_sonatype_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271989,8 +265181,7 @@ async def index_sonatype_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -272048,10 +265239,8 @@ async def index_sonatype_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -272105,7 +265294,6 @@ async def index_sonatype_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -272150,7 +265338,6 @@ def _index_sonatype_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -272251,10 +265438,6 @@ def _index_sonatype_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -272336,8 +265519,7 @@ async def index_sonicwall_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -272395,10 +265577,8 @@ async def index_sonicwall_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -272452,7 +265632,6 @@ async def index_sonicwall_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -272501,8 +265680,7 @@ async def index_sonicwall_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -272560,10 +265738,8 @@ async def index_sonicwall_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -272617,7 +265793,6 @@ async def index_sonicwall_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -272666,8 +265841,7 @@ async def index_sonicwall_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -272725,10 +265899,8 @@ async def index_sonicwall_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -272782,7 +265954,6 @@ async def index_sonicwall_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -272827,7 +265998,6 @@ def _index_sonicwall_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -272928,10 +266098,6 @@ def _index_sonicwall_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -273013,8 +266179,7 @@ async def index_spacelabs_healthcare_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273072,10 +266237,8 @@ async def index_spacelabs_healthcare_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273129,7 +266292,6 @@ async def index_spacelabs_healthcare_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -273178,8 +266340,7 @@ async def index_spacelabs_healthcare_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273237,10 +266398,8 @@ async def index_spacelabs_healthcare_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273294,7 +266453,6 @@ async def index_spacelabs_healthcare_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -273343,8 +266501,7 @@ async def index_spacelabs_healthcare_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273402,10 +266559,8 @@ async def index_spacelabs_healthcare_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273459,7 +266614,6 @@ async def index_spacelabs_healthcare_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -273504,7 +266658,6 @@ def _index_spacelabs_healthcare_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -273605,10 +266758,6 @@ def _index_spacelabs_healthcare_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -273690,8 +266839,7 @@ async def index_splunk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273749,10 +266897,8 @@ async def index_splunk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273806,7 +266952,6 @@ async def index_splunk_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -273855,8 +267000,7 @@ async def index_splunk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273914,10 +267058,8 @@ async def index_splunk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273971,7 +267113,6 @@ async def index_splunk_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274020,8 +267161,7 @@ async def index_splunk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -274079,10 +267219,8 @@ async def index_splunk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -274136,7 +267274,6 @@ async def index_splunk_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274181,7 +267318,6 @@ def _index_splunk_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -274282,10 +267418,6 @@ def _index_splunk_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -274367,8 +267499,7 @@ async def index_spring_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -274426,10 +267557,8 @@ async def index_spring_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -274483,7 +267612,6 @@ async def index_spring_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274532,8 +267660,7 @@ async def index_spring_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -274591,10 +267718,8 @@ async def index_spring_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -274648,7 +267773,6 @@ async def index_spring_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274697,8 +267821,7 @@ async def index_spring_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -274756,10 +267879,8 @@ async def index_spring_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -274813,7 +267934,6 @@ async def index_spring_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274858,7 +267978,6 @@ def _index_spring_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -274959,10 +268078,6 @@ def _index_spring_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -275044,8 +268159,7 @@ async def index_ssd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275103,10 +268217,8 @@ async def index_ssd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -275160,7 +268272,6 @@ async def index_ssd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -275209,8 +268320,7 @@ async def index_ssd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275268,10 +268378,8 @@ async def index_ssd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -275325,7 +268433,6 @@ async def index_ssd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -275374,8 +268481,7 @@ async def index_ssd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275433,10 +268539,8 @@ async def index_ssd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -275490,7 +268594,6 @@ async def index_ssd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -275535,7 +268638,6 @@ def _index_ssd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -275636,10 +268738,6 @@ def _index_ssd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -275721,8 +268819,7 @@ async def index_stormshield_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275780,10 +268877,8 @@ async def index_stormshield_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -275837,7 +268932,6 @@ async def index_stormshield_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -275886,8 +268980,7 @@ async def index_stormshield_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275945,10 +269038,8 @@ async def index_stormshield_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276002,7 +269093,6 @@ async def index_stormshield_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276051,8 +269141,7 @@ async def index_stormshield_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -276110,10 +269199,8 @@ async def index_stormshield_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276167,7 +269254,6 @@ async def index_stormshield_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276212,7 +269298,6 @@ def _index_stormshield_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -276313,10 +269398,6 @@ def _index_stormshield_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -276398,8 +269479,7 @@ async def index_stryker_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -276457,10 +269537,8 @@ async def index_stryker_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276514,7 +269592,6 @@ async def index_stryker_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276563,8 +269640,7 @@ async def index_stryker_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -276622,10 +269698,8 @@ async def index_stryker_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276679,7 +269753,6 @@ async def index_stryker_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276728,8 +269801,7 @@ async def index_stryker_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -276787,10 +269859,8 @@ async def index_stryker_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276844,7 +269914,6 @@ async def index_stryker_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276889,7 +269958,6 @@ def _index_stryker_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -276990,10 +270058,6 @@ def _index_stryker_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -277075,8 +270139,7 @@ async def index_sudo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277134,10 +270197,8 @@ async def index_sudo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -277191,7 +270252,6 @@ async def index_sudo_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -277240,8 +270300,7 @@ async def index_sudo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277299,10 +270358,8 @@ async def index_sudo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -277356,7 +270413,6 @@ async def index_sudo_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -277405,8 +270461,7 @@ async def index_sudo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277464,10 +270519,8 @@ async def index_sudo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -277521,7 +270574,6 @@ async def index_sudo_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -277566,7 +270618,6 @@ def _index_sudo_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -277667,10 +270718,6 @@ def _index_sudo_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -277752,8 +270799,7 @@ async def index_suse_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277811,10 +270857,8 @@ async def index_suse_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -277868,7 +270912,6 @@ async def index_suse_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -277917,8 +270960,7 @@ async def index_suse_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277976,10 +271018,8 @@ async def index_suse_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278033,7 +271073,6 @@ async def index_suse_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278082,8 +271121,7 @@ async def index_suse_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -278141,10 +271179,8 @@ async def index_suse_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278198,7 +271234,6 @@ async def index_suse_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278243,7 +271278,6 @@ def _index_suse_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -278344,10 +271378,6 @@ def _index_suse_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -278429,8 +271459,7 @@ async def index_suse_security_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -278488,10 +271517,8 @@ async def index_suse_security_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278545,7 +271572,6 @@ async def index_suse_security_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278594,8 +271620,7 @@ async def index_suse_security_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -278653,10 +271678,8 @@ async def index_suse_security_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278710,7 +271733,6 @@ async def index_suse_security_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278759,8 +271781,7 @@ async def index_suse_security_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -278818,10 +271839,8 @@ async def index_suse_security_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278875,7 +271894,6 @@ async def index_suse_security_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278920,7 +271938,6 @@ def _index_suse_security_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -279021,10 +272038,6 @@ def _index_suse_security_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -279106,8 +272119,7 @@ async def index_swift_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279165,10 +272177,8 @@ async def index_swift_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -279222,7 +272232,6 @@ async def index_swift_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -279271,8 +272280,7 @@ async def index_swift_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279330,10 +272338,8 @@ async def index_swift_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -279387,7 +272393,6 @@ async def index_swift_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -279436,8 +272441,7 @@ async def index_swift_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279495,10 +272499,8 @@ async def index_swift_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -279552,7 +272554,6 @@ async def index_swift_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -279597,7 +272598,6 @@ def _index_swift_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -279698,10 +272698,6 @@ def _index_swift_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -279783,8 +272779,7 @@ async def index_swisslog_healthcare_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279842,10 +272837,8 @@ async def index_swisslog_healthcare_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -279899,7 +272892,6 @@ async def index_swisslog_healthcare_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -279948,8 +272940,7 @@ async def index_swisslog_healthcare_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280007,10 +272998,8 @@ async def index_swisslog_healthcare_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280064,7 +273053,6 @@ async def index_swisslog_healthcare_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280113,8 +273101,7 @@ async def index_swisslog_healthcare_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280172,10 +273159,8 @@ async def index_swisslog_healthcare_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280229,7 +273214,6 @@ async def index_swisslog_healthcare_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280274,7 +273258,6 @@ def _index_swisslog_healthcare_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -280375,10 +273358,6 @@ def _index_swisslog_healthcare_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -280460,8 +273439,7 @@ async def index_symfony_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280519,10 +273497,8 @@ async def index_symfony_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280576,7 +273552,6 @@ async def index_symfony_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280625,8 +273600,7 @@ async def index_symfony_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280684,10 +273658,8 @@ async def index_symfony_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280741,7 +273713,6 @@ async def index_symfony_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280790,8 +273761,7 @@ async def index_symfony_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280849,10 +273819,8 @@ async def index_symfony_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280906,7 +273874,6 @@ async def index_symfony_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280951,7 +273918,6 @@ def _index_symfony_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -281052,10 +274018,6 @@ def _index_symfony_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -281137,8 +274099,7 @@ async def index_synacktiv_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281196,10 +274157,8 @@ async def index_synacktiv_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -281253,7 +274212,6 @@ async def index_synacktiv_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -281302,8 +274260,7 @@ async def index_synacktiv_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281361,10 +274318,8 @@ async def index_synacktiv_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -281418,7 +274373,6 @@ async def index_synacktiv_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -281467,8 +274421,7 @@ async def index_synacktiv_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281526,10 +274479,8 @@ async def index_synacktiv_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -281583,7 +274534,6 @@ async def index_synacktiv_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -281628,7 +274578,6 @@ def _index_synacktiv_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -281729,10 +274678,6 @@ def _index_synacktiv_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -281814,8 +274759,7 @@ async def index_syncrosoft_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281873,10 +274817,8 @@ async def index_syncrosoft_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -281930,7 +274872,6 @@ async def index_syncrosoft_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -281979,8 +274920,7 @@ async def index_syncrosoft_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282038,10 +274978,8 @@ async def index_syncrosoft_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282095,7 +275033,6 @@ async def index_syncrosoft_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282144,8 +275081,7 @@ async def index_syncrosoft_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282203,10 +275139,8 @@ async def index_syncrosoft_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282260,7 +275194,6 @@ async def index_syncrosoft_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282305,7 +275238,6 @@ def _index_syncrosoft_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -282406,10 +275338,6 @@ def _index_syncrosoft_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -282491,8 +275419,7 @@ async def index_synology_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282550,10 +275477,8 @@ async def index_synology_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282607,7 +275532,6 @@ async def index_synology_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282656,8 +275580,7 @@ async def index_synology_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282715,10 +275638,8 @@ async def index_synology_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282772,7 +275693,6 @@ async def index_synology_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282821,8 +275741,7 @@ async def index_synology_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282880,10 +275799,8 @@ async def index_synology_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282937,7 +275854,6 @@ async def index_synology_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282982,7 +275898,6 @@ def _index_synology_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -283083,10 +275998,6 @@ def _index_synology_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -283168,8 +276079,7 @@ async def index_syss_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -283227,10 +276137,8 @@ async def index_syss_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -283284,7 +276192,6 @@ async def index_syss_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -283333,8 +276240,7 @@ async def index_syss_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -283392,10 +276298,8 @@ async def index_syss_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -283449,7 +276353,6 @@ async def index_syss_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -283498,8 +276401,7 @@ async def index_syss_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -283557,10 +276459,8 @@ async def index_syss_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -283614,7 +276514,6 @@ async def index_syss_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -283659,7 +276558,6 @@ def _index_syss_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -283760,10 +276658,6 @@ def _index_syss_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -283845,8 +276739,7 @@ async def index_tailscale_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -283904,10 +276797,8 @@ async def index_tailscale_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -283961,7 +276852,6 @@ async def index_tailscale_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284010,8 +276900,7 @@ async def index_tailscale_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284069,10 +276958,8 @@ async def index_tailscale_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284126,7 +277013,6 @@ async def index_tailscale_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284175,8 +277061,7 @@ async def index_tailscale_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284234,10 +277119,8 @@ async def index_tailscale_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284291,7 +277174,6 @@ async def index_tailscale_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284336,7 +277218,6 @@ def _index_tailscale_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -284437,10 +277318,6 @@ def _index_tailscale_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -284522,8 +277399,7 @@ async def index_teamviewer_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284581,10 +277457,8 @@ async def index_teamviewer_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284638,7 +277512,6 @@ async def index_teamviewer_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284687,8 +277560,7 @@ async def index_teamviewer_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284746,10 +277618,8 @@ async def index_teamviewer_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284803,7 +277673,6 @@ async def index_teamviewer_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284852,8 +277721,7 @@ async def index_teamviewer_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284911,10 +277779,8 @@ async def index_teamviewer_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284968,7 +277834,6 @@ async def index_teamviewer_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -285013,7 +277878,6 @@ def _index_teamviewer_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -285114,10 +277978,6 @@ def _index_teamviewer_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -285199,8 +278059,7 @@ async def index_tenable_research_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -285258,10 +278117,8 @@ async def index_tenable_research_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -285315,7 +278172,6 @@ async def index_tenable_research_advisories_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -285364,8 +278220,7 @@ async def index_tenable_research_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -285423,10 +278278,8 @@ async def index_tenable_research_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -285480,7 +278333,6 @@ async def index_tenable_research_advisories_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -285529,8 +278381,7 @@ async def index_tenable_research_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -285588,10 +278439,8 @@ async def index_tenable_research_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -285645,7 +278494,6 @@ async def index_tenable_research_advisories_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -285690,7 +278538,6 @@ def _index_tenable_research_advisories_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -285791,10 +278638,6 @@ def _index_tenable_research_advisories_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -285876,8 +278719,7 @@ async def index_tencent_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -285935,10 +278777,8 @@ async def index_tencent_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -285992,7 +278832,6 @@ async def index_tencent_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286041,8 +278880,7 @@ async def index_tencent_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286100,10 +278938,8 @@ async def index_tencent_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286157,7 +278993,6 @@ async def index_tencent_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286206,8 +279041,7 @@ async def index_tencent_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286265,10 +279099,8 @@ async def index_tencent_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286322,7 +279154,6 @@ async def index_tencent_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286367,7 +279198,6 @@ def _index_tencent_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -286468,10 +279298,6 @@ def _index_tencent_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -286553,8 +279379,7 @@ async def index_thales_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286612,10 +279437,8 @@ async def index_thales_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286669,7 +279492,6 @@ async def index_thales_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286718,8 +279540,7 @@ async def index_thales_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286777,10 +279598,8 @@ async def index_thales_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286834,7 +279653,6 @@ async def index_thales_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286883,8 +279701,7 @@ async def index_thales_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286942,10 +279759,8 @@ async def index_thales_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286999,7 +279814,6 @@ async def index_thales_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -287044,7 +279858,6 @@ def _index_thales_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -287145,10 +279958,6 @@ def _index_thales_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -287230,8 +280039,7 @@ async def index_themissinglink_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -287289,10 +280097,8 @@ async def index_themissinglink_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -287346,7 +280152,6 @@ async def index_themissinglink_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -287395,8 +280200,7 @@ async def index_themissinglink_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -287454,10 +280258,8 @@ async def index_themissinglink_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -287511,7 +280313,6 @@ async def index_themissinglink_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -287560,8 +280361,7 @@ async def index_themissinglink_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -287619,10 +280419,8 @@ async def index_themissinglink_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -287676,7 +280474,6 @@ async def index_themissinglink_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -287721,7 +280518,6 @@ def _index_themissinglink_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -287822,10 +280618,6 @@ def _index_themissinglink_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -287907,8 +280699,7 @@ async def index_thermo_fisher_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -287966,10 +280757,8 @@ async def index_thermo_fisher_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288023,7 +280812,6 @@ async def index_thermo_fisher_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288072,8 +280860,7 @@ async def index_thermo_fisher_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288131,10 +280918,8 @@ async def index_thermo_fisher_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288188,7 +280973,6 @@ async def index_thermo_fisher_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288237,8 +281021,7 @@ async def index_thermo_fisher_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288296,10 +281079,8 @@ async def index_thermo_fisher_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288353,7 +281134,6 @@ async def index_thermo_fisher_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288398,7 +281178,6 @@ def _index_thermo_fisher_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -288499,10 +281278,6 @@ def _index_thermo_fisher_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -288584,8 +281359,7 @@ async def index_threat_actors_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288643,10 +281417,8 @@ async def index_threat_actors_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288700,7 +281472,6 @@ async def index_threat_actors_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288749,8 +281520,7 @@ async def index_threat_actors_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288808,10 +281578,8 @@ async def index_threat_actors_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288865,7 +281633,6 @@ async def index_threat_actors_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288914,8 +281681,7 @@ async def index_threat_actors_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288973,10 +281739,8 @@ async def index_threat_actors_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -289030,7 +281794,6 @@ async def index_threat_actors_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -289075,7 +281838,6 @@ def _index_threat_actors_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -289176,10 +281938,6 @@ def _index_threat_actors_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -289261,8 +282019,7 @@ async def index_ti_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -289320,10 +282077,8 @@ async def index_ti_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -289377,7 +282132,6 @@ async def index_ti_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -289426,8 +282180,7 @@ async def index_ti_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -289485,10 +282238,8 @@ async def index_ti_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -289542,7 +282293,6 @@ async def index_ti_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -289591,8 +282341,7 @@ async def index_ti_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -289650,10 +282399,8 @@ async def index_ti_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -289707,7 +282454,6 @@ async def index_ti_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -289752,7 +282498,6 @@ def _index_ti_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -289853,10 +282598,6 @@ def _index_ti_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -289938,8 +282679,7 @@ async def index_tibco_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -289997,10 +282737,8 @@ async def index_tibco_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290054,7 +282792,6 @@ async def index_tibco_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290103,8 +282840,7 @@ async def index_tibco_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290162,10 +282898,8 @@ async def index_tibco_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290219,7 +282953,6 @@ async def index_tibco_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290268,8 +283001,7 @@ async def index_tibco_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290327,10 +283059,8 @@ async def index_tibco_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290384,7 +283114,6 @@ async def index_tibco_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290429,7 +283158,6 @@ def _index_tibco_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -290530,10 +283258,6 @@ def _index_tibco_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -290615,8 +283339,7 @@ async def index_tp_link_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290674,10 +283397,8 @@ async def index_tp_link_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290731,7 +283452,6 @@ async def index_tp_link_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290780,8 +283500,7 @@ async def index_tp_link_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290839,10 +283558,8 @@ async def index_tp_link_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290896,7 +283613,6 @@ async def index_tp_link_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290945,8 +283661,7 @@ async def index_tp_link_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -291004,10 +283719,8 @@ async def index_tp_link_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -291061,7 +283774,6 @@ async def index_tp_link_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -291106,7 +283818,6 @@ def _index_tp_link_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -291207,10 +283918,6 @@ def _index_tp_link_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -291292,8 +283999,7 @@ async def index_trane_technology_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -291351,10 +284057,8 @@ async def index_trane_technology_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -291408,7 +284112,6 @@ async def index_trane_technology_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -291457,8 +284160,7 @@ async def index_trane_technology_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -291516,10 +284218,8 @@ async def index_trane_technology_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -291573,7 +284273,6 @@ async def index_trane_technology_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -291622,8 +284321,7 @@ async def index_trane_technology_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -291681,10 +284379,8 @@ async def index_trane_technology_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -291738,7 +284434,6 @@ async def index_trane_technology_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -291783,7 +284478,6 @@ def _index_trane_technology_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -291884,10 +284578,6 @@ def _index_trane_technology_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -291969,8 +284659,7 @@ async def index_trendmicro_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292028,10 +284717,8 @@ async def index_trendmicro_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292085,7 +284772,6 @@ async def index_trendmicro_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292134,8 +284820,7 @@ async def index_trendmicro_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292193,10 +284878,8 @@ async def index_trendmicro_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292250,7 +284933,6 @@ async def index_trendmicro_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292299,8 +284981,7 @@ async def index_trendmicro_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292358,10 +285039,8 @@ async def index_trendmicro_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292415,7 +285094,6 @@ async def index_trendmicro_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292460,7 +285138,6 @@ def _index_trendmicro_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -292561,10 +285238,6 @@ def _index_trendmicro_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -292646,8 +285319,7 @@ async def index_trustwave_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292705,10 +285377,8 @@ async def index_trustwave_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292762,7 +285432,6 @@ async def index_trustwave_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292811,8 +285480,7 @@ async def index_trustwave_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292870,10 +285538,8 @@ async def index_trustwave_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292927,7 +285593,6 @@ async def index_trustwave_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292976,8 +285641,7 @@ async def index_trustwave_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -293035,10 +285699,8 @@ async def index_trustwave_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -293092,7 +285754,6 @@ async def index_trustwave_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -293137,7 +285798,6 @@ def _index_trustwave_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -293238,10 +285898,6 @@ def _index_trustwave_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -293323,8 +285979,7 @@ async def index_twcert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -293382,10 +286037,8 @@ async def index_twcert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -293439,7 +286092,6 @@ async def index_twcert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -293488,8 +286140,7 @@ async def index_twcert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -293547,10 +286198,8 @@ async def index_twcert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -293604,7 +286253,6 @@ async def index_twcert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -293653,8 +286301,7 @@ async def index_twcert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -293712,10 +286359,8 @@ async def index_twcert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -293769,7 +286414,6 @@ async def index_twcert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -293814,7 +286458,6 @@ def _index_twcert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -293915,10 +286558,6 @@ def _index_twcert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -294000,8 +286639,7 @@ async def index_ubiquiti_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294059,10 +286697,8 @@ async def index_ubiquiti_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294116,7 +286752,6 @@ async def index_ubiquiti_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -294165,8 +286800,7 @@ async def index_ubiquiti_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294224,10 +286858,8 @@ async def index_ubiquiti_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294281,7 +286913,6 @@ async def index_ubiquiti_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -294330,8 +286961,7 @@ async def index_ubiquiti_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294389,10 +287019,8 @@ async def index_ubiquiti_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294446,7 +287074,6 @@ async def index_ubiquiti_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -294491,7 +287118,6 @@ def _index_ubiquiti_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -294592,10 +287218,6 @@ def _index_ubiquiti_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -294677,8 +287299,7 @@ async def index_ubuntu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294736,10 +287357,8 @@ async def index_ubuntu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294793,7 +287412,6 @@ async def index_ubuntu_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -294842,8 +287460,7 @@ async def index_ubuntu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294901,10 +287518,8 @@ async def index_ubuntu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294958,7 +287573,6 @@ async def index_ubuntu_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295007,8 +287621,7 @@ async def index_ubuntu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -295066,10 +287679,8 @@ async def index_ubuntu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -295123,7 +287734,6 @@ async def index_ubuntu_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295168,7 +287778,6 @@ def _index_ubuntu_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -295269,10 +287878,6 @@ def _index_ubuntu_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -295354,8 +287959,7 @@ async def index_ubuntu_purls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -295413,10 +288017,8 @@ async def index_ubuntu_purls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -295470,7 +288072,6 @@ async def index_ubuntu_purls_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295519,8 +288120,7 @@ async def index_ubuntu_purls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -295578,10 +288178,8 @@ async def index_ubuntu_purls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -295635,7 +288233,6 @@ async def index_ubuntu_purls_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295684,8 +288281,7 @@ async def index_ubuntu_purls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -295743,10 +288339,8 @@ async def index_ubuntu_purls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -295800,7 +288394,6 @@ async def index_ubuntu_purls_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295845,7 +288438,6 @@ def _index_ubuntu_purls_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -295946,10 +288538,6 @@ def _index_ubuntu_purls_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -296031,8 +288619,7 @@ async def index_unify_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296090,10 +288677,8 @@ async def index_unify_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296147,7 +288732,6 @@ async def index_unify_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -296196,8 +288780,7 @@ async def index_unify_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296255,10 +288838,8 @@ async def index_unify_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296312,7 +288893,6 @@ async def index_unify_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -296361,8 +288941,7 @@ async def index_unify_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296420,10 +288999,8 @@ async def index_unify_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296477,7 +289054,6 @@ async def index_unify_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -296522,7 +289098,6 @@ def _index_unify_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -296623,10 +289198,6 @@ def _index_unify_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -296708,8 +289279,7 @@ async def index_unisoc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296767,10 +289337,8 @@ async def index_unisoc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296824,7 +289392,6 @@ async def index_unisoc_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -296873,8 +289440,7 @@ async def index_unisoc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296932,10 +289498,8 @@ async def index_unisoc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296989,7 +289553,6 @@ async def index_unisoc_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297038,8 +289601,7 @@ async def index_unisoc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -297097,10 +289659,8 @@ async def index_unisoc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -297154,7 +289714,6 @@ async def index_unisoc_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297199,7 +289758,6 @@ def _index_unisoc_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -297300,10 +289858,6 @@ def _index_unisoc_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -297385,8 +289939,7 @@ async def index_usd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -297444,10 +289997,8 @@ async def index_usd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -297501,7 +290052,6 @@ async def index_usd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297550,8 +290100,7 @@ async def index_usd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -297609,10 +290158,8 @@ async def index_usd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -297666,7 +290213,6 @@ async def index_usd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297715,8 +290261,7 @@ async def index_usd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -297774,10 +290319,8 @@ async def index_usd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -297831,7 +290374,6 @@ async def index_usd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297876,7 +290418,6 @@ def _index_usd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -297977,10 +290518,6 @@ def _index_usd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -298062,8 +290599,7 @@ async def index_usom_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298121,10 +290657,8 @@ async def index_usom_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -298178,7 +290712,6 @@ async def index_usom_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -298227,8 +290760,7 @@ async def index_usom_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298286,10 +290818,8 @@ async def index_usom_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -298343,7 +290873,6 @@ async def index_usom_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -298392,8 +290921,7 @@ async def index_usom_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298451,10 +290979,8 @@ async def index_usom_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -298508,7 +291034,6 @@ async def index_usom_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -298553,7 +291078,6 @@ def _index_usom_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -298654,10 +291178,6 @@ def _index_usom_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -298739,8 +291259,7 @@ async def index_vandyke_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298798,10 +291317,8 @@ async def index_vandyke_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -298855,7 +291372,6 @@ async def index_vandyke_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -298904,8 +291420,7 @@ async def index_vandyke_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298963,10 +291478,8 @@ async def index_vandyke_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299020,7 +291533,6 @@ async def index_vandyke_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299069,8 +291581,7 @@ async def index_vandyke_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -299128,10 +291639,8 @@ async def index_vandyke_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299185,7 +291694,6 @@ async def index_vandyke_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299230,7 +291738,6 @@ def _index_vandyke_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -299331,10 +291838,6 @@ def _index_vandyke_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -299416,8 +291919,7 @@ async def index_vapidlabs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -299475,10 +291977,8 @@ async def index_vapidlabs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299532,7 +292032,6 @@ async def index_vapidlabs_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299581,8 +292080,7 @@ async def index_vapidlabs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -299640,10 +292138,8 @@ async def index_vapidlabs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299697,7 +292193,6 @@ async def index_vapidlabs_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299746,8 +292241,7 @@ async def index_vapidlabs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -299805,10 +292299,8 @@ async def index_vapidlabs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299862,7 +292354,6 @@ async def index_vapidlabs_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299907,7 +292398,6 @@ def _index_vapidlabs_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -300008,10 +292498,6 @@ def _index_vapidlabs_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -300093,8 +292579,7 @@ async def index_vc_cpe_dictionary_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300152,10 +292637,8 @@ async def index_vc_cpe_dictionary_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -300209,7 +292692,6 @@ async def index_vc_cpe_dictionary_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -300258,8 +292740,7 @@ async def index_vc_cpe_dictionary_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300317,10 +292798,8 @@ async def index_vc_cpe_dictionary_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -300374,7 +292853,6 @@ async def index_vc_cpe_dictionary_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -300423,8 +292901,7 @@ async def index_vc_cpe_dictionary_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300482,10 +292959,8 @@ async def index_vc_cpe_dictionary_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -300539,7 +293014,6 @@ async def index_vc_cpe_dictionary_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -300584,7 +293058,6 @@ def _index_vc_cpe_dictionary_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -300685,10 +293158,6 @@ def _index_vc_cpe_dictionary_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -300770,8 +293239,7 @@ async def index_vde_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300829,10 +293297,8 @@ async def index_vde_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -300886,7 +293352,6 @@ async def index_vde_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -300935,8 +293400,7 @@ async def index_vde_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300994,10 +293458,8 @@ async def index_vde_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301051,7 +293513,6 @@ async def index_vde_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301100,8 +293561,7 @@ async def index_vde_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -301159,10 +293619,8 @@ async def index_vde_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301216,7 +293674,6 @@ async def index_vde_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301261,7 +293718,6 @@ def _index_vde_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -301362,10 +293818,6 @@ def _index_vde_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -301447,8 +293899,7 @@ async def index_veeam_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -301506,10 +293957,8 @@ async def index_veeam_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301563,7 +294012,6 @@ async def index_veeam_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301612,8 +294060,7 @@ async def index_veeam_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -301671,10 +294118,8 @@ async def index_veeam_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301728,7 +294173,6 @@ async def index_veeam_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301777,8 +294221,7 @@ async def index_veeam_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -301836,10 +294279,8 @@ async def index_veeam_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301893,7 +294334,6 @@ async def index_veeam_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301938,7 +294378,6 @@ def _index_veeam_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -302039,10 +294478,6 @@ def _index_veeam_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -302124,8 +294559,7 @@ async def index_veritas_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302183,10 +294617,8 @@ async def index_veritas_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -302240,7 +294672,6 @@ async def index_veritas_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -302289,8 +294720,7 @@ async def index_veritas_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302348,10 +294778,8 @@ async def index_veritas_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -302405,7 +294833,6 @@ async def index_veritas_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -302454,8 +294881,7 @@ async def index_veritas_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302513,10 +294939,8 @@ async def index_veritas_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -302570,7 +294994,6 @@ async def index_veritas_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -302615,7 +295038,6 @@ def _index_veritas_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -302716,10 +295138,6 @@ def _index_veritas_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -302801,8 +295219,7 @@ async def index_virtuozzo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302860,10 +295277,8 @@ async def index_virtuozzo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -302917,7 +295332,6 @@ async def index_virtuozzo_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -302966,8 +295380,7 @@ async def index_virtuozzo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303025,10 +295438,8 @@ async def index_virtuozzo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303082,7 +295493,6 @@ async def index_virtuozzo_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303131,8 +295541,7 @@ async def index_virtuozzo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303190,10 +295599,8 @@ async def index_virtuozzo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303247,7 +295654,6 @@ async def index_virtuozzo_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303292,7 +295698,6 @@ def _index_virtuozzo_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -303393,10 +295798,6 @@ def _index_virtuozzo_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -303478,8 +295879,7 @@ async def index_vlc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303537,10 +295937,8 @@ async def index_vlc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303594,7 +295992,6 @@ async def index_vlc_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303643,8 +296040,7 @@ async def index_vlc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303702,10 +296098,8 @@ async def index_vlc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303759,7 +296153,6 @@ async def index_vlc_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303808,8 +296201,7 @@ async def index_vlc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303867,10 +296259,8 @@ async def index_vlc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303924,7 +296314,6 @@ async def index_vlc_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303969,7 +296358,6 @@ def _index_vlc_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -304070,10 +296458,6 @@ def _index_vlc_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -304155,8 +296539,7 @@ async def index_vmware_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -304214,10 +296597,8 @@ async def index_vmware_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -304271,7 +296652,6 @@ async def index_vmware_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -304320,8 +296700,7 @@ async def index_vmware_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -304379,10 +296758,8 @@ async def index_vmware_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -304436,7 +296813,6 @@ async def index_vmware_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -304485,8 +296861,7 @@ async def index_vmware_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -304544,10 +296919,8 @@ async def index_vmware_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -304601,7 +296974,6 @@ async def index_vmware_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -304646,7 +297018,6 @@ def _index_vmware_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -304747,10 +297118,6 @@ def _index_vmware_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -304832,8 +297199,7 @@ async def index_voidsec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -304891,10 +297257,8 @@ async def index_voidsec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -304948,7 +297312,6 @@ async def index_voidsec_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -304997,8 +297360,7 @@ async def index_voidsec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305056,10 +297418,8 @@ async def index_voidsec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305113,7 +297473,6 @@ async def index_voidsec_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305162,8 +297521,7 @@ async def index_voidsec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305221,10 +297579,8 @@ async def index_voidsec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305278,7 +297634,6 @@ async def index_voidsec_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305323,7 +297678,6 @@ def _index_voidsec_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -305424,10 +297778,6 @@ def _index_voidsec_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -305502,8 +297852,8 @@ async def index_vulncheck_canaries10d_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305547,10 +297897,10 @@ async def index_vulncheck_canaries10d_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305596,8 +297946,8 @@ async def index_vulncheck_canaries10d_get( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305639,8 +297989,8 @@ async def index_vulncheck_canaries10d_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305684,10 +298034,10 @@ async def index_vulncheck_canaries10d_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305733,8 +298083,8 @@ async def index_vulncheck_canaries10d_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305776,8 +298126,8 @@ async def index_vulncheck_canaries10d_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305821,10 +298171,10 @@ async def index_vulncheck_canaries10d_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305870,8 +298220,8 @@ async def index_vulncheck_canaries10d_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305908,8 +298258,8 @@ def _index_vulncheck_canaries10d_get_serialize( published, src_country, dst_country, + src_ip, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -305978,13 +298328,13 @@ def _index_vulncheck_canaries10d_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if var_date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', var_date)) if updated_at_start_date is not None: @@ -306060,8 +298410,8 @@ async def index_vulncheck_canaries30d_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306105,10 +298455,10 @@ async def index_vulncheck_canaries30d_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306154,8 +298504,8 @@ async def index_vulncheck_canaries30d_get( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306197,8 +298547,8 @@ async def index_vulncheck_canaries30d_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306242,10 +298592,10 @@ async def index_vulncheck_canaries30d_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306291,8 +298641,8 @@ async def index_vulncheck_canaries30d_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306334,8 +298684,8 @@ async def index_vulncheck_canaries30d_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306379,10 +298729,10 @@ async def index_vulncheck_canaries30d_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306428,8 +298778,8 @@ async def index_vulncheck_canaries30d_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306466,8 +298816,8 @@ def _index_vulncheck_canaries30d_get_serialize( published, src_country, dst_country, + src_ip, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -306536,13 +298886,13 @@ def _index_vulncheck_canaries30d_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if var_date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', var_date)) if updated_at_start_date is not None: @@ -306618,8 +298968,8 @@ async def index_vulncheck_canaries3d_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306663,10 +299013,10 @@ async def index_vulncheck_canaries3d_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306712,8 +299062,8 @@ async def index_vulncheck_canaries3d_get( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306755,8 +299105,8 @@ async def index_vulncheck_canaries3d_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306800,10 +299150,10 @@ async def index_vulncheck_canaries3d_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306849,8 +299199,8 @@ async def index_vulncheck_canaries3d_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306892,8 +299242,8 @@ async def index_vulncheck_canaries3d_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306937,10 +299287,10 @@ async def index_vulncheck_canaries3d_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306986,8 +299336,8 @@ async def index_vulncheck_canaries3d_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307024,8 +299374,8 @@ def _index_vulncheck_canaries3d_get_serialize( published, src_country, dst_country, + src_ip, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -307094,13 +299444,13 @@ def _index_vulncheck_canaries3d_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if var_date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', var_date)) if updated_at_start_date is not None: @@ -307176,8 +299526,8 @@ async def index_vulncheck_canaries90d_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307221,10 +299571,10 @@ async def index_vulncheck_canaries90d_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307270,8 +299620,8 @@ async def index_vulncheck_canaries90d_get( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307313,8 +299663,8 @@ async def index_vulncheck_canaries90d_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307358,10 +299708,10 @@ async def index_vulncheck_canaries90d_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307407,8 +299757,8 @@ async def index_vulncheck_canaries90d_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307450,8 +299800,8 @@ async def index_vulncheck_canaries90d_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307495,10 +299845,10 @@ async def index_vulncheck_canaries90d_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307544,8 +299894,8 @@ async def index_vulncheck_canaries90d_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307582,8 +299932,8 @@ def _index_vulncheck_canaries90d_get_serialize( published, src_country, dst_country, + src_ip, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -307652,13 +300002,13 @@ def _index_vulncheck_canaries90d_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if var_date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', var_date)) if updated_at_start_date is not None: @@ -307734,8 +300084,8 @@ async def index_vulncheck_canaries_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307779,10 +300129,10 @@ async def index_vulncheck_canaries_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307828,8 +300178,8 @@ async def index_vulncheck_canaries_get( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307871,8 +300221,8 @@ async def index_vulncheck_canaries_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307916,10 +300266,10 @@ async def index_vulncheck_canaries_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307965,8 +300315,8 @@ async def index_vulncheck_canaries_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308008,8 +300358,8 @@ async def index_vulncheck_canaries_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308053,10 +300403,10 @@ async def index_vulncheck_canaries_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -308102,8 +300452,8 @@ async def index_vulncheck_canaries_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308140,8 +300490,8 @@ def _index_vulncheck_canaries_get_serialize( published, src_country, dst_country, + src_ip, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -308210,13 +300560,13 @@ def _index_vulncheck_canaries_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if var_date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', var_date)) if updated_at_start_date is not None: @@ -308299,8 +300649,7 @@ async def index_vulncheck_config_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308358,10 +300707,8 @@ async def index_vulncheck_config_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -308415,7 +300762,6 @@ async def index_vulncheck_config_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308464,8 +300810,7 @@ async def index_vulncheck_config_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308523,10 +300868,8 @@ async def index_vulncheck_config_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -308580,7 +300923,6 @@ async def index_vulncheck_config_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308629,8 +300971,7 @@ async def index_vulncheck_config_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308688,10 +301029,8 @@ async def index_vulncheck_config_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -308745,7 +301084,6 @@ async def index_vulncheck_config_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308790,7 +301128,6 @@ def _index_vulncheck_config_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -308891,10 +301228,6 @@ def _index_vulncheck_config_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -308976,8 +301309,7 @@ async def index_vulncheck_cvelist_v5_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309035,10 +301367,8 @@ async def index_vulncheck_cvelist_v5_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309092,7 +301422,6 @@ async def index_vulncheck_cvelist_v5_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309141,8 +301470,7 @@ async def index_vulncheck_cvelist_v5_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309200,10 +301528,8 @@ async def index_vulncheck_cvelist_v5_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309257,7 +301583,6 @@ async def index_vulncheck_cvelist_v5_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309306,8 +301631,7 @@ async def index_vulncheck_cvelist_v5_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309365,10 +301689,8 @@ async def index_vulncheck_cvelist_v5_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309422,7 +301744,6 @@ async def index_vulncheck_cvelist_v5_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309467,7 +301788,6 @@ def _index_vulncheck_cvelist_v5_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -309568,10 +301888,6 @@ def _index_vulncheck_cvelist_v5_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -309653,8 +301969,7 @@ async def index_vulncheck_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309712,10 +302027,8 @@ async def index_vulncheck_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309769,7 +302082,6 @@ async def index_vulncheck_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309818,8 +302130,7 @@ async def index_vulncheck_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309877,10 +302188,8 @@ async def index_vulncheck_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309934,7 +302243,6 @@ async def index_vulncheck_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309983,8 +302291,7 @@ async def index_vulncheck_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -310042,10 +302349,8 @@ async def index_vulncheck_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -310099,7 +302404,6 @@ async def index_vulncheck_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -310144,7 +302448,6 @@ def _index_vulncheck_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -310245,10 +302548,6 @@ def _index_vulncheck_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -310330,8 +302629,7 @@ async def index_vulncheck_kev_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -310389,10 +302687,8 @@ async def index_vulncheck_kev_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -310446,7 +302742,6 @@ async def index_vulncheck_kev_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -310495,8 +302790,7 @@ async def index_vulncheck_kev_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -310554,10 +302848,8 @@ async def index_vulncheck_kev_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -310611,7 +302903,6 @@ async def index_vulncheck_kev_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -310660,8 +302951,7 @@ async def index_vulncheck_kev_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -310719,10 +303009,8 @@ async def index_vulncheck_kev_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -310776,7 +303064,6 @@ async def index_vulncheck_kev_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -310821,7 +303108,6 @@ def _index_vulncheck_kev_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -310922,10 +303208,6 @@ def _index_vulncheck_kev_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -311007,8 +303289,7 @@ async def index_vulncheck_nvd2_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311066,10 +303347,8 @@ async def index_vulncheck_nvd2_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311123,7 +303402,6 @@ async def index_vulncheck_nvd2_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -311172,8 +303450,7 @@ async def index_vulncheck_nvd2_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311231,10 +303508,8 @@ async def index_vulncheck_nvd2_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311288,7 +303563,6 @@ async def index_vulncheck_nvd2_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -311337,8 +303611,7 @@ async def index_vulncheck_nvd2_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311396,10 +303669,8 @@ async def index_vulncheck_nvd2_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311453,7 +303724,6 @@ async def index_vulncheck_nvd2_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -311498,7 +303768,6 @@ def _index_vulncheck_nvd2_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -311599,10 +303868,6 @@ def _index_vulncheck_nvd2_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -311684,8 +303949,7 @@ async def index_vulncheck_nvd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311743,10 +304007,8 @@ async def index_vulncheck_nvd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311800,7 +304062,6 @@ async def index_vulncheck_nvd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -311849,8 +304110,7 @@ async def index_vulncheck_nvd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311908,10 +304168,8 @@ async def index_vulncheck_nvd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311965,7 +304223,6 @@ async def index_vulncheck_nvd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312014,8 +304271,7 @@ async def index_vulncheck_nvd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -312073,10 +304329,8 @@ async def index_vulncheck_nvd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -312130,7 +304384,6 @@ async def index_vulncheck_nvd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312175,7 +304428,6 @@ def _index_vulncheck_nvd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -312276,10 +304528,6 @@ def _index_vulncheck_nvd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -312361,8 +304609,7 @@ async def index_vulnerability_aliases_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -312420,10 +304667,8 @@ async def index_vulnerability_aliases_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -312477,7 +304722,6 @@ async def index_vulnerability_aliases_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312526,8 +304770,7 @@ async def index_vulnerability_aliases_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -312585,10 +304828,8 @@ async def index_vulnerability_aliases_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -312642,7 +304883,6 @@ async def index_vulnerability_aliases_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312691,8 +304931,7 @@ async def index_vulnerability_aliases_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -312750,10 +304989,8 @@ async def index_vulnerability_aliases_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -312807,7 +305044,6 @@ async def index_vulnerability_aliases_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312852,7 +305088,6 @@ def _index_vulnerability_aliases_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -312953,10 +305188,6 @@ def _index_vulnerability_aliases_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -313038,8 +305269,7 @@ async def index_vulnrichment_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313097,10 +305327,8 @@ async def index_vulnrichment_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313154,7 +305382,6 @@ async def index_vulnrichment_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -313203,8 +305430,7 @@ async def index_vulnrichment_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313262,10 +305488,8 @@ async def index_vulnrichment_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313319,7 +305543,6 @@ async def index_vulnrichment_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -313368,8 +305591,7 @@ async def index_vulnrichment_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313427,10 +305649,8 @@ async def index_vulnrichment_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313484,7 +305704,6 @@ async def index_vulnrichment_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -313529,7 +305748,6 @@ def _index_vulnrichment_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -313630,10 +305848,6 @@ def _index_vulnrichment_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -313715,8 +305929,7 @@ async def index_vyaire_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313774,10 +305987,8 @@ async def index_vyaire_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313831,7 +306042,6 @@ async def index_vyaire_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -313880,8 +306090,7 @@ async def index_vyaire_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313939,10 +306148,8 @@ async def index_vyaire_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313996,7 +306203,6 @@ async def index_vyaire_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314045,8 +306251,7 @@ async def index_vyaire_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -314104,10 +306309,8 @@ async def index_vyaire_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -314161,7 +306364,6 @@ async def index_vyaire_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314206,7 +306408,6 @@ def _index_vyaire_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -314307,10 +306508,6 @@ def _index_vyaire_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -314392,8 +306589,7 @@ async def index_watchguard_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -314451,10 +306647,8 @@ async def index_watchguard_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -314508,7 +306702,6 @@ async def index_watchguard_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314557,8 +306750,7 @@ async def index_watchguard_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -314616,10 +306808,8 @@ async def index_watchguard_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -314673,7 +306863,6 @@ async def index_watchguard_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314722,8 +306911,7 @@ async def index_watchguard_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -314781,10 +306969,8 @@ async def index_watchguard_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -314838,7 +307024,6 @@ async def index_watchguard_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314883,7 +307068,6 @@ def _index_watchguard_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -314984,10 +307168,6 @@ def _index_watchguard_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -315069,8 +307249,7 @@ async def index_whatsapp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315128,10 +307307,8 @@ async def index_whatsapp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -315185,7 +307362,6 @@ async def index_whatsapp_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -315234,8 +307410,7 @@ async def index_whatsapp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315293,10 +307468,8 @@ async def index_whatsapp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -315350,7 +307523,6 @@ async def index_whatsapp_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -315399,8 +307571,7 @@ async def index_whatsapp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315458,10 +307629,8 @@ async def index_whatsapp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -315515,7 +307684,6 @@ async def index_whatsapp_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -315560,7 +307728,6 @@ def _index_whatsapp_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -315661,10 +307828,6 @@ def _index_whatsapp_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -315746,8 +307909,7 @@ async def index_wibu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315805,10 +307967,8 @@ async def index_wibu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -315862,7 +308022,6 @@ async def index_wibu_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -315911,8 +308070,7 @@ async def index_wibu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315970,10 +308128,8 @@ async def index_wibu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316027,7 +308183,6 @@ async def index_wibu_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316076,8 +308231,7 @@ async def index_wibu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -316135,10 +308289,8 @@ async def index_wibu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316192,7 +308344,6 @@ async def index_wibu_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316237,7 +308388,6 @@ def _index_wibu_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -316338,10 +308488,6 @@ def _index_wibu_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -316423,8 +308569,7 @@ async def index_wireshark_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -316482,10 +308627,8 @@ async def index_wireshark_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316539,7 +308682,6 @@ async def index_wireshark_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316588,8 +308730,7 @@ async def index_wireshark_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -316647,10 +308788,8 @@ async def index_wireshark_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316704,7 +308843,6 @@ async def index_wireshark_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316753,8 +308891,7 @@ async def index_wireshark_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -316812,10 +308949,8 @@ async def index_wireshark_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316869,7 +309004,6 @@ async def index_wireshark_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316914,7 +309048,6 @@ def _index_wireshark_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -317015,10 +309148,6 @@ def _index_wireshark_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -317100,8 +309229,7 @@ async def index_with_secure_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317159,10 +309287,8 @@ async def index_with_secure_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -317216,7 +309342,6 @@ async def index_with_secure_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -317265,8 +309390,7 @@ async def index_with_secure_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317324,10 +309448,8 @@ async def index_with_secure_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -317381,7 +309503,6 @@ async def index_with_secure_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -317430,8 +309551,7 @@ async def index_with_secure_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317489,10 +309609,8 @@ async def index_with_secure_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -317546,7 +309664,6 @@ async def index_with_secure_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -317591,7 +309708,6 @@ def _index_with_secure_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -317692,10 +309808,6 @@ def _index_with_secure_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -317777,8 +309889,7 @@ async def index_wolfi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317836,10 +309947,8 @@ async def index_wolfi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -317893,7 +310002,6 @@ async def index_wolfi_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -317942,8 +310050,7 @@ async def index_wolfi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318001,10 +310108,8 @@ async def index_wolfi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318058,7 +310163,6 @@ async def index_wolfi_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318107,8 +310211,7 @@ async def index_wolfi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318166,10 +310269,8 @@ async def index_wolfi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318223,7 +310324,6 @@ async def index_wolfi_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318268,7 +310368,6 @@ def _index_wolfi_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -318369,10 +310468,6 @@ def _index_wolfi_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -318454,8 +310549,7 @@ async def index_wolfssl_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318513,10 +310607,8 @@ async def index_wolfssl_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318570,7 +310662,6 @@ async def index_wolfssl_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318619,8 +310710,7 @@ async def index_wolfssl_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318678,10 +310768,8 @@ async def index_wolfssl_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318735,7 +310823,6 @@ async def index_wolfssl_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318784,8 +310871,7 @@ async def index_wolfssl_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318843,10 +310929,8 @@ async def index_wolfssl_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318900,7 +310984,6 @@ async def index_wolfssl_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318945,7 +311028,6 @@ def _index_wolfssl_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -319046,10 +311128,6 @@ def _index_wolfssl_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -319131,8 +311209,7 @@ async def index_wordfence_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319190,10 +311267,8 @@ async def index_wordfence_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -319247,7 +311322,6 @@ async def index_wordfence_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -319296,8 +311370,7 @@ async def index_wordfence_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319355,10 +311428,8 @@ async def index_wordfence_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -319412,7 +311483,6 @@ async def index_wordfence_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -319461,8 +311531,7 @@ async def index_wordfence_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319520,10 +311589,8 @@ async def index_wordfence_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -319577,7 +311644,6 @@ async def index_wordfence_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -319622,7 +311688,6 @@ def _index_wordfence_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -319723,10 +311788,6 @@ def _index_wordfence_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -319808,8 +311869,7 @@ async def index_xen_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319867,10 +311927,8 @@ async def index_xen_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -319924,7 +311982,6 @@ async def index_xen_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -319973,8 +312030,7 @@ async def index_xen_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320032,10 +312088,8 @@ async def index_xen_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320089,7 +312143,6 @@ async def index_xen_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320138,8 +312191,7 @@ async def index_xen_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320197,10 +312249,8 @@ async def index_xen_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320254,7 +312304,6 @@ async def index_xen_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320299,7 +312348,6 @@ def _index_xen_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -320400,10 +312448,6 @@ def _index_xen_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -320485,8 +312529,7 @@ async def index_xerox_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320544,10 +312587,8 @@ async def index_xerox_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320601,7 +312642,6 @@ async def index_xerox_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320650,8 +312690,7 @@ async def index_xerox_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320709,10 +312748,8 @@ async def index_xerox_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320766,7 +312803,6 @@ async def index_xerox_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320815,8 +312851,7 @@ async def index_xerox_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320874,10 +312909,8 @@ async def index_xerox_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320931,7 +312964,6 @@ async def index_xerox_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320976,7 +313008,6 @@ def _index_xerox_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -321077,10 +313108,6 @@ def _index_xerox_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -321162,8 +313189,7 @@ async def index_xiaomi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -321221,10 +313247,8 @@ async def index_xiaomi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -321278,7 +313302,6 @@ async def index_xiaomi_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -321327,8 +313350,7 @@ async def index_xiaomi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -321386,10 +313408,8 @@ async def index_xiaomi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -321443,7 +313463,6 @@ async def index_xiaomi_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -321492,8 +313511,7 @@ async def index_xiaomi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -321551,10 +313569,8 @@ async def index_xiaomi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -321608,7 +313624,6 @@ async def index_xiaomi_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -321653,7 +313668,6 @@ def _index_xiaomi_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -321754,10 +313768,6 @@ def _index_xiaomi_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -321839,8 +313849,7 @@ async def index_xylem_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -321898,10 +313907,8 @@ async def index_xylem_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -321955,7 +313962,6 @@ async def index_xylem_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322004,8 +314010,7 @@ async def index_xylem_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322063,10 +314068,8 @@ async def index_xylem_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322120,7 +314123,6 @@ async def index_xylem_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322169,8 +314171,7 @@ async def index_xylem_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322228,10 +314229,8 @@ async def index_xylem_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322285,7 +314284,6 @@ async def index_xylem_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322330,7 +314328,6 @@ def _index_xylem_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -322431,10 +314428,6 @@ def _index_xylem_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -322516,8 +314509,7 @@ async def index_yamaha_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322575,10 +314567,8 @@ async def index_yamaha_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322632,7 +314622,6 @@ async def index_yamaha_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322681,8 +314670,7 @@ async def index_yamaha_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322740,10 +314728,8 @@ async def index_yamaha_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322797,7 +314783,6 @@ async def index_yamaha_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322846,8 +314831,7 @@ async def index_yamaha_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322905,10 +314889,8 @@ async def index_yamaha_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322962,7 +314944,6 @@ async def index_yamaha_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -323007,7 +314988,6 @@ def _index_yamaha_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -323108,10 +315088,6 @@ def _index_yamaha_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -323193,8 +315169,7 @@ async def index_yokogawa_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -323252,10 +315227,8 @@ async def index_yokogawa_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -323309,7 +315282,6 @@ async def index_yokogawa_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -323358,8 +315330,7 @@ async def index_yokogawa_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -323417,10 +315388,8 @@ async def index_yokogawa_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -323474,7 +315443,6 @@ async def index_yokogawa_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -323523,8 +315491,7 @@ async def index_yokogawa_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -323582,10 +315549,8 @@ async def index_yokogawa_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -323639,7 +315604,6 @@ async def index_yokogawa_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -323684,7 +315648,6 @@ def _index_yokogawa_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -323785,10 +315748,6 @@ def _index_yokogawa_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -323870,8 +315829,7 @@ async def index_yubico_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -323929,10 +315887,8 @@ async def index_yubico_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -323986,7 +315942,6 @@ async def index_yubico_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324035,8 +315990,7 @@ async def index_yubico_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324094,10 +316048,8 @@ async def index_yubico_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324151,7 +316103,6 @@ async def index_yubico_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324200,8 +316151,7 @@ async def index_yubico_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324259,10 +316209,8 @@ async def index_yubico_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324316,7 +316264,6 @@ async def index_yubico_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324361,7 +316308,6 @@ def _index_yubico_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -324462,10 +316408,6 @@ def _index_yubico_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -324547,8 +316489,7 @@ async def index_zdi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324606,10 +316547,8 @@ async def index_zdi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324663,7 +316602,6 @@ async def index_zdi_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324712,8 +316650,7 @@ async def index_zdi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324771,10 +316708,8 @@ async def index_zdi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324828,7 +316763,6 @@ async def index_zdi_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324877,8 +316811,7 @@ async def index_zdi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324936,10 +316869,8 @@ async def index_zdi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324993,7 +316924,6 @@ async def index_zdi_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -325038,7 +316968,6 @@ def _index_zdi_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -325139,10 +317068,6 @@ def _index_zdi_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -325224,8 +317149,7 @@ async def index_zebra_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -325283,10 +317207,8 @@ async def index_zebra_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -325340,7 +317262,6 @@ async def index_zebra_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -325389,8 +317310,7 @@ async def index_zebra_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -325448,10 +317368,8 @@ async def index_zebra_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -325505,7 +317423,6 @@ async def index_zebra_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -325554,8 +317471,7 @@ async def index_zebra_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -325613,10 +317529,8 @@ async def index_zebra_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -325670,7 +317584,6 @@ async def index_zebra_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -325715,7 +317628,6 @@ def _index_zebra_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -325816,10 +317728,6 @@ def _index_zebra_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -325901,8 +317809,7 @@ async def index_zeroscience_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -325960,10 +317867,8 @@ async def index_zeroscience_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326017,7 +317922,6 @@ async def index_zeroscience_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326066,8 +317970,7 @@ async def index_zeroscience_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326125,10 +318028,8 @@ async def index_zeroscience_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326182,7 +318083,6 @@ async def index_zeroscience_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326231,8 +318131,7 @@ async def index_zeroscience_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326290,10 +318189,8 @@ async def index_zeroscience_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326347,7 +318244,6 @@ async def index_zeroscience_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326392,7 +318288,6 @@ def _index_zeroscience_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -326493,10 +318388,6 @@ def _index_zeroscience_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -326578,8 +318469,7 @@ async def index_zimbra_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326637,10 +318527,8 @@ async def index_zimbra_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326694,7 +318582,6 @@ async def index_zimbra_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326743,8 +318630,7 @@ async def index_zimbra_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326802,10 +318688,8 @@ async def index_zimbra_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326859,7 +318743,6 @@ async def index_zimbra_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326908,8 +318791,7 @@ async def index_zimbra_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326967,10 +318849,8 @@ async def index_zimbra_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -327024,7 +318904,6 @@ async def index_zimbra_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -327069,7 +318948,6 @@ def _index_zimbra_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -327170,10 +319048,6 @@ def _index_zimbra_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -327255,8 +319129,7 @@ async def index_zoom_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -327314,10 +319187,8 @@ async def index_zoom_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -327371,7 +319242,6 @@ async def index_zoom_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -327420,8 +319290,7 @@ async def index_zoom_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -327479,10 +319348,8 @@ async def index_zoom_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -327536,7 +319403,6 @@ async def index_zoom_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -327585,8 +319451,7 @@ async def index_zoom_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -327644,10 +319509,8 @@ async def index_zoom_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -327701,7 +319564,6 @@ async def index_zoom_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -327746,7 +319608,6 @@ def _index_zoom_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -327847,10 +319708,6 @@ def _index_zoom_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -327932,8 +319789,7 @@ async def index_zscaler_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -327991,10 +319847,8 @@ async def index_zscaler_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328048,7 +319902,6 @@ async def index_zscaler_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328097,8 +319950,7 @@ async def index_zscaler_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328156,10 +320008,8 @@ async def index_zscaler_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328213,7 +320063,6 @@ async def index_zscaler_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328262,8 +320111,7 @@ async def index_zscaler_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328321,10 +320169,8 @@ async def index_zscaler_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328378,7 +320224,6 @@ async def index_zscaler_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328423,7 +320268,6 @@ def _index_zscaler_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -328524,10 +320368,6 @@ def _index_zscaler_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -328609,8 +320449,7 @@ async def index_zuso_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328668,10 +320507,8 @@ async def index_zuso_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328725,7 +320562,6 @@ async def index_zuso_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328774,8 +320610,7 @@ async def index_zuso_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328833,10 +320668,8 @@ async def index_zuso_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328890,7 +320723,6 @@ async def index_zuso_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328939,8 +320771,7 @@ async def index_zuso_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328998,10 +320829,8 @@ async def index_zuso_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -329055,7 +320884,6 @@ async def index_zuso_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -329100,7 +320928,6 @@ def _index_zuso_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -329201,10 +321028,6 @@ def _index_zuso_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -329286,8 +321109,7 @@ async def index_zyxel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -329345,10 +321167,8 @@ async def index_zyxel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -329402,7 +321222,6 @@ async def index_zyxel_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -329451,8 +321270,7 @@ async def index_zyxel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -329510,10 +321328,8 @@ async def index_zyxel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -329567,7 +321383,6 @@ async def index_zyxel_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -329616,8 +321431,7 @@ async def index_zyxel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -329675,10 +321489,8 @@ async def index_zyxel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -329732,7 +321544,6 @@ async def index_zyxel_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -329777,7 +321588,6 @@ def _index_zyxel_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -329878,10 +321688,6 @@ def _index_zyxel_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) diff --git a/vulncheck_sdk/aio/api_client.py b/vulncheck_sdk/aio/api_client.py index 109e7779..32119f2c 100644 --- a/vulncheck_sdk/aio/api_client.py +++ b/vulncheck_sdk/aio/api_client.py @@ -92,7 +92,7 @@ def __init__( self.default_headers[header_name] = header_value self.cookie = cookie # Set default User-Agent. - self.user_agent = 'OpenAPI-Generator/0.0.41/python' + self.user_agent = 'OpenAPI-Generator/0.0.42/python' self.client_side_validation = configuration.client_side_validation async def __aenter__(self): diff --git a/vulncheck_sdk/aio/configuration.py b/vulncheck_sdk/aio/configuration.py index 0f3eab8f..59396f13 100644 --- a/vulncheck_sdk/aio/configuration.py +++ b/vulncheck_sdk/aio/configuration.py @@ -532,7 +532,7 @@ def to_debug_report(self) -> str: "OS: {env}\n"\ "Python Version: {pyversion}\n"\ "Version of the API: 3.0\n"\ - "SDK Package Version: 0.0.41".\ + "SDK Package Version: 0.0.42".\ format(env=sys.platform, pyversion=sys.version) def get_host_settings(self) -> List[HostSetting]: @@ -543,7 +543,7 @@ def get_host_settings(self) -> List[HostSetting]: return [ { 'url': "/v3", - 'description': "No description provided", + 'description': "VulnCheck API v3", } ] diff --git a/vulncheck_sdk/aio/models/__init__.py b/vulncheck_sdk/aio/models/__init__.py index db203bca..78b57a24 100644 --- a/vulncheck_sdk/aio/models/__init__.py +++ b/vulncheck_sdk/aio/models/__init__.py @@ -160,13 +160,11 @@ from vulncheck_sdk.aio.models.advisory_cve_detail import AdvisoryCVEDetail from vulncheck_sdk.aio.models.advisory_cve_details_link import AdvisoryCVEDetailsLink from vulncheck_sdk.aio.models.advisory_cve_reference import AdvisoryCVEReference -from vulncheck_sdk.aio.models.advisory_cvrf_reference import AdvisoryCVRFReference from vulncheck_sdk.aio.models.advisory_cvss import AdvisoryCVSS from vulncheck_sdk.aio.models.advisory_cvssv2 import AdvisoryCVSSV2 from vulncheck_sdk.aio.models.advisory_cvssv3 import AdvisoryCVSSV3 from vulncheck_sdk.aio.models.advisory_cvssv40 import AdvisoryCVSSV40 from vulncheck_sdk.aio.models.advisory_cvssv40_threat import AdvisoryCVSSV40Threat -from vulncheck_sdk.aio.models.advisory_cwe_node import AdvisoryCWENode from vulncheck_sdk.aio.models.advisory_canvas_exploit import AdvisoryCanvasExploit from vulncheck_sdk.aio.models.advisory_capec import AdvisoryCapec from vulncheck_sdk.aio.models.advisory_carestream_advisory import AdvisoryCarestreamAdvisory @@ -226,7 +224,6 @@ from vulncheck_sdk.aio.models.advisory_dan_foss_cve_details import AdvisoryDanFossCVEDetails from vulncheck_sdk.aio.models.advisory_danfoss import AdvisoryDanfoss from vulncheck_sdk.aio.models.advisory_dassault import AdvisoryDassault -from vulncheck_sdk.aio.models.advisory_date_time import AdvisoryDateTime from vulncheck_sdk.aio.models.advisory_debian_cve import AdvisoryDebianCVE from vulncheck_sdk.aio.models.advisory_debian_security_advisory import AdvisoryDebianSecurityAdvisory from vulncheck_sdk.aio.models.advisory_dell import AdvisoryDell @@ -236,9 +233,7 @@ from vulncheck_sdk.aio.models.advisory_distro_version import AdvisoryDistroVersion from vulncheck_sdk.aio.models.advisory_django import AdvisoryDjango from vulncheck_sdk.aio.models.advisory_document_metadata import AdvisoryDocumentMetadata -from vulncheck_sdk.aio.models.advisory_document_note import AdvisoryDocumentNote from vulncheck_sdk.aio.models.advisory_document_publisher import AdvisoryDocumentPublisher -from vulncheck_sdk.aio.models.advisory_document_tracking import AdvisoryDocumentTracking from vulncheck_sdk.aio.models.advisory_dot_cms import AdvisoryDotCMS from vulncheck_sdk.aio.models.advisory_dragos_advisory import AdvisoryDragosAdvisory from vulncheck_sdk.aio.models.advisory_draytek import AdvisoryDraytek @@ -353,7 +348,6 @@ from vulncheck_sdk.aio.models.advisory_ip_intel_record import AdvisoryIpIntelRecord from vulncheck_sdk.aio.models.advisory_israeli_alert import AdvisoryIsraeliAlert from vulncheck_sdk.aio.models.advisory_israeli_vulnerability import AdvisoryIsraeliVulnerability -from vulncheck_sdk.aio.models.advisory_issued import AdvisoryIssued from vulncheck_sdk.aio.models.advisory_istio import AdvisoryIstio from vulncheck_sdk.aio.models.advisory_ivanti import AdvisoryIvanti from vulncheck_sdk.aio.models.advisory_ivanti_rss import AdvisoryIvantiRSS @@ -534,7 +528,6 @@ from vulncheck_sdk.aio.models.advisory_product import AdvisoryProduct from vulncheck_sdk.aio.models.advisory_product_branch import AdvisoryProductBranch from vulncheck_sdk.aio.models.advisory_product_specific_detail import AdvisoryProductSpecificDetail -from vulncheck_sdk.aio.models.advisory_product_tree import AdvisoryProductTree from vulncheck_sdk.aio.models.advisory_products_affected import AdvisoryProductsAffected from vulncheck_sdk.aio.models.advisory_progress import AdvisoryProgress from vulncheck_sdk.aio.models.advisory_proofpoint import AdvisoryProofpoint @@ -564,12 +557,10 @@ from vulncheck_sdk.aio.models.advisory_redhat_cve import AdvisoryRedhatCVE from vulncheck_sdk.aio.models.advisory_reference import AdvisoryReference from vulncheck_sdk.aio.models.advisory_related_rule import AdvisoryRelatedRule -from vulncheck_sdk.aio.models.advisory_relationship import AdvisoryRelationship from vulncheck_sdk.aio.models.advisory_remediation_data import AdvisoryRemediationData from vulncheck_sdk.aio.models.advisory_renesas import AdvisoryRenesas from vulncheck_sdk.aio.models.advisory_reported_exploit import AdvisoryReportedExploit from vulncheck_sdk.aio.models.advisory_restart_data import AdvisoryRestartData -from vulncheck_sdk.aio.models.advisory_revision import AdvisoryRevision from vulncheck_sdk.aio.models.advisory_revision_history import AdvisoryRevisionHistory from vulncheck_sdk.aio.models.advisory_revive import AdvisoryRevive from vulncheck_sdk.aio.models.advisory_rhel_cve import AdvisoryRhelCVE @@ -603,7 +594,6 @@ from vulncheck_sdk.aio.models.advisory_schneider_cve import AdvisorySchneiderCVE from vulncheck_sdk.aio.models.advisory_schneider_electric_advisory import AdvisorySchneiderElectricAdvisory from vulncheck_sdk.aio.models.advisory_schutzwerk import AdvisorySchutzwerk -from vulncheck_sdk.aio.models.advisory_score_set import AdvisoryScoreSet from vulncheck_sdk.aio.models.advisory_sec_fix import AdvisorySecFix from vulncheck_sdk.aio.models.advisory_security_bulletin import AdvisorySecurityBulletin from vulncheck_sdk.aio.models.advisory_security_lab import AdvisorySecurityLab @@ -655,7 +645,6 @@ from vulncheck_sdk.aio.models.advisory_splunk import AdvisorySplunk from vulncheck_sdk.aio.models.advisory_splunk_product import AdvisorySplunkProduct from vulncheck_sdk.aio.models.advisory_spring import AdvisorySpring -from vulncheck_sdk.aio.models.advisory_status import AdvisoryStatus from vulncheck_sdk.aio.models.advisory_stormshield import AdvisoryStormshield from vulncheck_sdk.aio.models.advisory_stryker_advisory import AdvisoryStrykerAdvisory from vulncheck_sdk.aio.models.advisory_sudo import AdvisorySudo @@ -677,7 +666,6 @@ from vulncheck_sdk.aio.models.advisory_thales import AdvisoryThales from vulncheck_sdk.aio.models.advisory_the_missing_link import AdvisoryTheMissingLink from vulncheck_sdk.aio.models.advisory_thermo_fisher import AdvisoryThermoFisher -from vulncheck_sdk.aio.models.advisory_threat import AdvisoryThreat from vulncheck_sdk.aio.models.advisory_threat_actor_with_external_objects import AdvisoryThreatActorWithExternalObjects from vulncheck_sdk.aio.models.advisory_threat_data import AdvisoryThreatData from vulncheck_sdk.aio.models.advisory_tibco import AdvisoryTibco @@ -698,7 +686,6 @@ from vulncheck_sdk.aio.models.advisory_unify import AdvisoryUnify from vulncheck_sdk.aio.models.advisory_unisoc import AdvisoryUnisoc from vulncheck_sdk.aio.models.advisory_update import AdvisoryUpdate -from vulncheck_sdk.aio.models.advisory_updated import AdvisoryUpdated from vulncheck_sdk.aio.models.advisory_v3_acceptance_level import AdvisoryV3AcceptanceLevel from vulncheck_sdk.aio.models.advisory_vccpe_dictionary import AdvisoryVCCPEDictionary from vulncheck_sdk.aio.models.advisory_vc_vulnerable_cpes import AdvisoryVCVulnerableCPEs @@ -720,7 +707,6 @@ from vulncheck_sdk.aio.models.advisory_vuln_check_config import AdvisoryVulnCheckConfig from vulncheck_sdk.aio.models.advisory_vuln_check_kev import AdvisoryVulnCheckKEV from vulncheck_sdk.aio.models.advisory_vuln_check_package import AdvisoryVulnCheckPackage -from vulncheck_sdk.aio.models.advisory_vulnerability import AdvisoryVulnerability from vulncheck_sdk.aio.models.advisory_vulnerable_debian_package import AdvisoryVulnerableDebianPackage from vulncheck_sdk.aio.models.advisory_vulnerable_product import AdvisoryVulnerableProduct from vulncheck_sdk.aio.models.advisory_vulnrichment import AdvisoryVulnrichment @@ -780,7 +766,6 @@ from vulncheck_sdk.aio.models.api_configurations import ApiConfigurations from vulncheck_sdk.aio.models.api_cve_items import ApiCveItems from vulncheck_sdk.aio.models.api_cve_items_extended import ApiCveItemsExtended -from vulncheck_sdk.aio.models.api_date_time import ApiDateTime from vulncheck_sdk.aio.models.api_description import ApiDescription from vulncheck_sdk.aio.models.api_description_data import ApiDescriptionData from vulncheck_sdk.aio.models.api_epss import ApiEPSS diff --git a/vulncheck_sdk/aio/models/advisory_adp_container.py b/vulncheck_sdk/aio/models/advisory_adp_container.py index 29e4acbd..6416be91 100644 --- a/vulncheck_sdk/aio/models/advisory_adp_container.py +++ b/vulncheck_sdk/aio/models/advisory_adp_container.py @@ -40,7 +40,7 @@ class AdvisoryADPContainer(BaseModel): impacts: Optional[List[AdvisoryImpact]] = Field(default=None, description="OK") metrics: Optional[List[AdvisoryMetric]] = Field(default=None, description="OK") problem_types: Optional[List[AdvisoryMProblemTypes]] = Field(default=None, description="OK", alias="problemTypes") - provider_metadata: Optional[AdvisoryMProviderMetadata] = Field(default=None, description="OK", alias="providerMetadata") + provider_metadata: Optional[AdvisoryMProviderMetadata] = Field(default=None, alias="providerMetadata") references: Optional[List[AdvisoryMReference]] = None tags: Optional[List[StrictStr]] = Field(default=None, description="OK") title: Optional[StrictStr] = Field(default=None, description="OK") diff --git a/vulncheck_sdk/aio/models/advisory_advisory_details.py b/vulncheck_sdk/aio/models/advisory_advisory_details.py index 930fc1a9..3a01be6a 100644 --- a/vulncheck_sdk/aio/models/advisory_advisory_details.py +++ b/vulncheck_sdk/aio/models/advisory_advisory_details.py @@ -21,9 +21,7 @@ from pydantic import BaseModel, ConfigDict, StrictStr from typing import Any, ClassVar, Dict, List, Optional from vulncheck_sdk.aio.models.advisory_bugzilla import AdvisoryBugzilla -from vulncheck_sdk.aio.models.advisory_issued import AdvisoryIssued from vulncheck_sdk.aio.models.advisory_oval_cve import AdvisoryOvalCVE -from vulncheck_sdk.aio.models.advisory_updated import AdvisoryUpdated from typing import Optional, Set from typing_extensions import Self @@ -33,9 +31,9 @@ class AdvisoryAdvisoryDetails(BaseModel): """ # noqa: E501 bugzilla: Optional[AdvisoryBugzilla] = None cve: Optional[AdvisoryOvalCVE] = None - issued: Optional[AdvisoryIssued] = None + issued: Optional[Dict[str, Any]] = None severity: Optional[StrictStr] = None - updated: Optional[AdvisoryUpdated] = None + updated: Optional[Dict[str, Any]] = None __properties: ClassVar[List[str]] = ["bugzilla", "cve", "issued", "severity", "updated"] model_config = ConfigDict( @@ -83,12 +81,6 @@ def to_dict(self) -> Dict[str, Any]: # override the default output from pydantic by calling `to_dict()` of cve if self.cve: _dict['cve'] = self.cve.to_dict() - # override the default output from pydantic by calling `to_dict()` of issued - if self.issued: - _dict['issued'] = self.issued.to_dict() - # override the default output from pydantic by calling `to_dict()` of updated - if self.updated: - _dict['updated'] = self.updated.to_dict() return _dict @classmethod @@ -103,9 +95,9 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: _obj = cls.model_validate({ "bugzilla": AdvisoryBugzilla.from_dict(obj["bugzilla"]) if obj.get("bugzilla") is not None else None, "cve": AdvisoryOvalCVE.from_dict(obj["cve"]) if obj.get("cve") is not None else None, - "issued": AdvisoryIssued.from_dict(obj["issued"]) if obj.get("issued") is not None else None, + "issued": obj.get("issued"), "severity": obj.get("severity"), - "updated": AdvisoryUpdated.from_dict(obj["updated"]) if obj.get("updated") is not None else None + "updated": obj.get("updated") }) return _obj diff --git a/vulncheck_sdk/aio/models/advisory_affected.py b/vulncheck_sdk/aio/models/advisory_affected.py index dbacf1ba..34e61401 100644 --- a/vulncheck_sdk/aio/models/advisory_affected.py +++ b/vulncheck_sdk/aio/models/advisory_affected.py @@ -18,7 +18,7 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, Field, StrictStr +from pydantic import BaseModel, ConfigDict, StrictStr from typing import Any, ClassVar, Dict, List, Optional from vulncheck_sdk.aio.models.advisory_osv_package import AdvisoryOSVPackage from vulncheck_sdk.aio.models.advisory_range import AdvisoryRange @@ -30,8 +30,8 @@ class AdvisoryAffected(BaseModel): """ AdvisoryAffected """ # noqa: E501 - database_specific: Optional[Dict[str, Any]] = Field(default=None, description="The meaning of the values within the object is entirely defined by the database") - ecosystem_specific: Optional[Dict[str, Any]] = Field(default=None, description="The meaning of the values within the object is entirely defined by the ecosystem") + database_specific: Optional[Any] = None + ecosystem_specific: Optional[Any] = None package: Optional[AdvisoryOSVPackage] = None ranges: Optional[List[AdvisoryRange]] = None severity: Optional[List[AdvisorySeverity]] = None @@ -94,6 +94,16 @@ def to_dict(self) -> Dict[str, Any]: if _item_severity: _items.append(_item_severity.to_dict()) _dict['severity'] = _items + # set to None if database_specific (nullable) is None + # and model_fields_set contains the field + if self.database_specific is None and "database_specific" in self.model_fields_set: + _dict['database_specific'] = None + + # set to None if ecosystem_specific (nullable) is None + # and model_fields_set contains the field + if self.ecosystem_specific is None and "ecosystem_specific" in self.model_fields_set: + _dict['ecosystem_specific'] = None + return _dict @classmethod diff --git a/vulncheck_sdk/aio/models/advisory_cisco_csaf.py b/vulncheck_sdk/aio/models/advisory_cisco_csaf.py index 7d5e8ee7..20969763 100644 --- a/vulncheck_sdk/aio/models/advisory_cisco_csaf.py +++ b/vulncheck_sdk/aio/models/advisory_cisco_csaf.py @@ -27,7 +27,7 @@ class AdvisoryCiscoCSAF(BaseModel): """ AdvisoryCiscoCSAF """ # noqa: E501 - csaf: Optional[Dict[str, Any]] = None + csaf: Optional[Any] = None cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None identifier: Optional[StrictStr] = None @@ -75,6 +75,11 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) + # set to None if csaf (nullable) is None + # and model_fields_set contains the field + if self.csaf is None and "csaf" in self.model_fields_set: + _dict['csaf'] = None + return _dict @classmethod diff --git a/vulncheck_sdk/aio/models/advisory_csaf.py b/vulncheck_sdk/aio/models/advisory_csaf.py index 928a2089..03904048 100644 --- a/vulncheck_sdk/aio/models/advisory_csaf.py +++ b/vulncheck_sdk/aio/models/advisory_csaf.py @@ -31,9 +31,9 @@ class AdvisoryCSAF(BaseModel): """ AdvisoryCSAF """ # noqa: E501 - document: Optional[AdvisoryDocumentMetadata] = Field(default=None, description="Document contains metadata about the CSAF document itself. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property") + document: Optional[AdvisoryDocumentMetadata] = None notes: Optional[List[AdvisoryCSAFNote]] = Field(default=None, description="Notes holds notes associated with the whole document. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3217-document-property---notes") - product_tree: Optional[AdvisoryProductBranch] = Field(default=None, description="ProductTree contains information about the product tree (branches only). https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property") + product_tree: Optional[AdvisoryProductBranch] = None vulnerabilities: Optional[List[AdvisoryCSAFVulnerability]] = Field(default=None, description="Vulnerabilities contains information about the vulnerabilities, (i.e. CVEs), associated threats, and product status. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#323-vulnerabilities-property") __properties: ClassVar[List[str]] = ["document", "notes", "product_tree", "vulnerabilities"] diff --git a/vulncheck_sdk/aio/models/advisory_cvrf.py b/vulncheck_sdk/aio/models/advisory_cvrf.py index 3e6c3cd5..6abcf70e 100644 --- a/vulncheck_sdk/aio/models/advisory_cvrf.py +++ b/vulncheck_sdk/aio/models/advisory_cvrf.py @@ -18,13 +18,8 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, Field, StrictStr +from pydantic import BaseModel, ConfigDict, StrictStr from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.aio.models.advisory_cvrf_reference import AdvisoryCVRFReference -from vulncheck_sdk.aio.models.advisory_document_note import AdvisoryDocumentNote -from vulncheck_sdk.aio.models.advisory_document_tracking import AdvisoryDocumentTracking -from vulncheck_sdk.aio.models.advisory_product_tree import AdvisoryProductTree -from vulncheck_sdk.aio.models.advisory_vulnerability import AdvisoryVulnerability from typing import Optional, Set from typing_extensions import Self @@ -33,13 +28,7 @@ class AdvisoryCvrf(BaseModel): AdvisoryCvrf """ # noqa: E501 cve: Optional[List[StrictStr]] = None - notes: Optional[List[AdvisoryDocumentNote]] = None - product_tree: Optional[AdvisoryProductTree] = Field(default=None, alias="productTree") - references: Optional[List[AdvisoryCVRFReference]] = None - title: Optional[StrictStr] = None - tracking: Optional[AdvisoryDocumentTracking] = None - vulnerabilities: Optional[List[AdvisoryVulnerability]] = None - __properties: ClassVar[List[str]] = ["cve", "notes", "productTree", "references", "title", "tracking", "vulnerabilities"] + __properties: ClassVar[List[str]] = ["cve"] model_config = ConfigDict( populate_by_name=True, @@ -80,33 +69,6 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of each item in notes (list) - _items = [] - if self.notes: - for _item_notes in self.notes: - if _item_notes: - _items.append(_item_notes.to_dict()) - _dict['notes'] = _items - # override the default output from pydantic by calling `to_dict()` of product_tree - if self.product_tree: - _dict['productTree'] = self.product_tree.to_dict() - # override the default output from pydantic by calling `to_dict()` of each item in references (list) - _items = [] - if self.references: - for _item_references in self.references: - if _item_references: - _items.append(_item_references.to_dict()) - _dict['references'] = _items - # override the default output from pydantic by calling `to_dict()` of tracking - if self.tracking: - _dict['tracking'] = self.tracking.to_dict() - # override the default output from pydantic by calling `to_dict()` of each item in vulnerabilities (list) - _items = [] - if self.vulnerabilities: - for _item_vulnerabilities in self.vulnerabilities: - if _item_vulnerabilities: - _items.append(_item_vulnerabilities.to_dict()) - _dict['vulnerabilities'] = _items return _dict @classmethod @@ -119,13 +81,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "cve": obj.get("cve"), - "notes": [AdvisoryDocumentNote.from_dict(_item) for _item in obj["notes"]] if obj.get("notes") is not None else None, - "productTree": AdvisoryProductTree.from_dict(obj["productTree"]) if obj.get("productTree") is not None else None, - "references": [AdvisoryCVRFReference.from_dict(_item) for _item in obj["references"]] if obj.get("references") is not None else None, - "title": obj.get("title"), - "tracking": AdvisoryDocumentTracking.from_dict(obj["tracking"]) if obj.get("tracking") is not None else None, - "vulnerabilities": [AdvisoryVulnerability.from_dict(_item) for _item in obj["vulnerabilities"]] if obj.get("vulnerabilities") is not None else None + "cve": obj.get("cve") }) return _obj diff --git a/vulncheck_sdk/aio/models/advisory_cvrf_reference.py b/vulncheck_sdk/aio/models/advisory_cvrf_reference.py deleted file mode 100644 index e62a271a..00000000 --- a/vulncheck_sdk/aio/models/advisory_cvrf_reference.py +++ /dev/null @@ -1,90 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryCVRFReference(BaseModel): - """ - AdvisoryCVRFReference - """ # noqa: E501 - description: Optional[StrictStr] = None - url: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["description", "url"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryCVRFReference from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryCVRFReference from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "description": obj.get("description"), - "url": obj.get("url") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_cvssv40.py b/vulncheck_sdk/aio/models/advisory_cvssv40.py index fa7bf159..250e1c1e 100644 --- a/vulncheck_sdk/aio/models/advisory_cvssv40.py +++ b/vulncheck_sdk/aio/models/advisory_cvssv40.py @@ -25,7 +25,7 @@ class AdvisoryCVSSV40(BaseModel): """ - AdvisoryCVSSV40 + this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics """ # noqa: E501 automatable: Optional[StrictStr] = Field(default=None, alias="Automatable") recovery: Optional[StrictStr] = Field(default=None, alias="Recovery") diff --git a/vulncheck_sdk/aio/models/advisory_cwe_node.py b/vulncheck_sdk/aio/models/advisory_cwe_node.py deleted file mode 100644 index 477c9d42..00000000 --- a/vulncheck_sdk/aio/models/advisory_cwe_node.py +++ /dev/null @@ -1,94 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryCWENode(BaseModel): - """ - AdvisoryCWENode - """ # noqa: E501 - cweid: Optional[StrictStr] = None - description: Optional[StrictStr] = None - id: Optional[StrictStr] = None - name: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["cweid", "description", "id", "name"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryCWENode from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryCWENode from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "cweid": obj.get("cweid"), - "description": obj.get("description"), - "id": obj.get("id"), - "name": obj.get("name") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_cwes.py b/vulncheck_sdk/aio/models/advisory_cwes.py index afb5b020..83c91b1d 100644 --- a/vulncheck_sdk/aio/models/advisory_cwes.py +++ b/vulncheck_sdk/aio/models/advisory_cwes.py @@ -18,9 +18,8 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, Field, StrictInt +from pydantic import BaseModel, ConfigDict from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.aio.models.advisory_cwe_node import AdvisoryCWENode from typing import Optional, Set from typing_extensions import Self @@ -28,9 +27,8 @@ class AdvisoryCwes(BaseModel): """ AdvisoryCwes """ # noqa: E501 - nodes: Optional[List[AdvisoryCWENode]] = None - total_count: Optional[StrictInt] = Field(default=None, alias="totalCount") - __properties: ClassVar[List[str]] = ["nodes", "totalCount"] + nodes: Optional[List[Dict[str, Any]]] = None + __properties: ClassVar[List[str]] = ["nodes"] model_config = ConfigDict( populate_by_name=True, @@ -71,13 +69,6 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of each item in nodes (list) - _items = [] - if self.nodes: - for _item_nodes in self.nodes: - if _item_nodes: - _items.append(_item_nodes.to_dict()) - _dict['nodes'] = _items return _dict @classmethod @@ -90,8 +81,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "nodes": [AdvisoryCWENode.from_dict(_item) for _item in obj["nodes"]] if obj.get("nodes") is not None else None, - "totalCount": obj.get("totalCount") + "nodes": obj.get("nodes") }) return _obj diff --git a/vulncheck_sdk/aio/models/advisory_cycle.py b/vulncheck_sdk/aio/models/advisory_cycle.py index 812309b2..8469a64f 100644 --- a/vulncheck_sdk/aio/models/advisory_cycle.py +++ b/vulncheck_sdk/aio/models/advisory_cycle.py @@ -29,16 +29,16 @@ class AdvisoryCycle(BaseModel): """ # noqa: E501 codename: Optional[StrictStr] = None cycle: Optional[StrictStr] = None - discontinued: Optional[Dict[str, Any]] = None - eol: Optional[Dict[str, Any]] = None - extended_support: Optional[Dict[str, Any]] = Field(default=None, alias="extendedSupport") + discontinued: Optional[Any] = None + eol: Optional[Any] = None + extended_support: Optional[Any] = Field(default=None, alias="extendedSupport") latest: Optional[StrictStr] = None latest_release_date: Optional[StrictStr] = Field(default=None, alias="latestReleaseDate") link: Optional[StrictStr] = None - lts: Optional[Dict[str, Any]] = None + lts: Optional[Any] = None release_date: Optional[StrictStr] = Field(default=None, alias="releaseDate") release_label: Optional[StrictStr] = Field(default=None, alias="releaseLabel") - support: Optional[Dict[str, Any]] = None + support: Optional[Any] = None __properties: ClassVar[List[str]] = ["codename", "cycle", "discontinued", "eol", "extendedSupport", "latest", "latestReleaseDate", "link", "lts", "releaseDate", "releaseLabel", "support"] model_config = ConfigDict( @@ -80,6 +80,31 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) + # set to None if discontinued (nullable) is None + # and model_fields_set contains the field + if self.discontinued is None and "discontinued" in self.model_fields_set: + _dict['discontinued'] = None + + # set to None if eol (nullable) is None + # and model_fields_set contains the field + if self.eol is None and "eol" in self.model_fields_set: + _dict['eol'] = None + + # set to None if extended_support (nullable) is None + # and model_fields_set contains the field + if self.extended_support is None and "extended_support" in self.model_fields_set: + _dict['extendedSupport'] = None + + # set to None if lts (nullable) is None + # and model_fields_set contains the field + if self.lts is None and "lts" in self.model_fields_set: + _dict['lts'] = None + + # set to None if support (nullable) is None + # and model_fields_set contains the field + if self.support is None and "support" in self.model_fields_set: + _dict['support'] = None + return _dict @classmethod diff --git a/vulncheck_sdk/aio/models/advisory_date_time.py b/vulncheck_sdk/aio/models/advisory_date_time.py deleted file mode 100644 index cd1d72b0..00000000 --- a/vulncheck_sdk/aio/models/advisory_date_time.py +++ /dev/null @@ -1,88 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryDateTime(BaseModel): - """ - AdvisoryDateTime - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - __properties: ClassVar[List[str]] = ["date"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryDateTime from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryDateTime from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_document_metadata.py b/vulncheck_sdk/aio/models/advisory_document_metadata.py index 834e1728..7f31b716 100644 --- a/vulncheck_sdk/aio/models/advisory_document_metadata.py +++ b/vulncheck_sdk/aio/models/advisory_document_metadata.py @@ -29,7 +29,7 @@ class AdvisoryDocumentMetadata(BaseModel): """ - AdvisoryDocumentMetadata + Document contains metadata about the CSAF document itself. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property """ # noqa: E501 category: Optional[StrictStr] = None csaf_version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_document_note.py b/vulncheck_sdk/aio/models/advisory_document_note.py deleted file mode 100644 index fbdc7eb4..00000000 --- a/vulncheck_sdk/aio/models/advisory_document_note.py +++ /dev/null @@ -1,92 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryDocumentNote(BaseModel): - """ - AdvisoryDocumentNote - """ # noqa: E501 - text: Optional[StrictStr] = None - title: Optional[StrictStr] = None - type: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["text", "title", "type"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryDocumentNote from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryDocumentNote from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "text": obj.get("text"), - "title": obj.get("title"), - "type": obj.get("type") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_document_tracking.py b/vulncheck_sdk/aio/models/advisory_document_tracking.py deleted file mode 100644 index aa0ac550..00000000 --- a/vulncheck_sdk/aio/models/advisory_document_tracking.py +++ /dev/null @@ -1,106 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.aio.models.advisory_revision import AdvisoryRevision -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryDocumentTracking(BaseModel): - """ - AdvisoryDocumentTracking - """ # noqa: E501 - current_release_date: Optional[StrictStr] = Field(default=None, alias="currentReleaseDate") - id: Optional[StrictStr] = None - initial_release_date: Optional[StrictStr] = Field(default=None, alias="initialReleaseDate") - revision_history: Optional[List[AdvisoryRevision]] = Field(default=None, alias="revisionHistory") - status: Optional[StrictStr] = None - version: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["currentReleaseDate", "id", "initialReleaseDate", "revisionHistory", "status", "version"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryDocumentTracking from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - # override the default output from pydantic by calling `to_dict()` of each item in revision_history (list) - _items = [] - if self.revision_history: - for _item_revision_history in self.revision_history: - if _item_revision_history: - _items.append(_item_revision_history.to_dict()) - _dict['revisionHistory'] = _items - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryDocumentTracking from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "currentReleaseDate": obj.get("currentReleaseDate"), - "id": obj.get("id"), - "initialReleaseDate": obj.get("initialReleaseDate"), - "revisionHistory": [AdvisoryRevision.from_dict(_item) for _item in obj["revisionHistory"]] if obj.get("revisionHistory") is not None else None, - "status": obj.get("status"), - "version": obj.get("version") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_issued.py b/vulncheck_sdk/aio/models/advisory_issued.py deleted file mode 100644 index 13353408..00000000 --- a/vulncheck_sdk/aio/models/advisory_issued.py +++ /dev/null @@ -1,88 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryIssued(BaseModel): - """ - AdvisoryIssued - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - __properties: ClassVar[List[str]] = ["date"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryIssued from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryIssued from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_lol_advs.py b/vulncheck_sdk/aio/models/advisory_lol_advs.py index a32b6eb9..7cd94f4d 100644 --- a/vulncheck_sdk/aio/models/advisory_lol_advs.py +++ b/vulncheck_sdk/aio/models/advisory_lol_advs.py @@ -31,7 +31,7 @@ class AdvisoryLolAdvs(BaseModel): date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None id: Optional[StrictStr] = None - lol_json: Optional[Dict[str, Dict[str, Any]]] = None + lol_json: Optional[Dict[str, Any]] = None mitre_id: Optional[StrictStr] = None references: Optional[List[StrictStr]] = None updated_at: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_m_provider_metadata.py b/vulncheck_sdk/aio/models/advisory_m_provider_metadata.py index 4db58079..47991260 100644 --- a/vulncheck_sdk/aio/models/advisory_m_provider_metadata.py +++ b/vulncheck_sdk/aio/models/advisory_m_provider_metadata.py @@ -25,7 +25,7 @@ class AdvisoryMProviderMetadata(BaseModel): """ - AdvisoryMProviderMetadata + OK """ # noqa: E501 date_updated: Optional[StrictStr] = Field(default=None, description="FIXME: flip to time", alias="dateUpdated") org_id: Optional[StrictStr] = Field(default=None, alias="orgId") diff --git a/vulncheck_sdk/aio/models/advisory_microsoft_driver_block_list.py b/vulncheck_sdk/aio/models/advisory_microsoft_driver_block_list.py index ac4d3de7..97bd7a4b 100644 --- a/vulncheck_sdk/aio/models/advisory_microsoft_driver_block_list.py +++ b/vulncheck_sdk/aio/models/advisory_microsoft_driver_block_list.py @@ -30,7 +30,7 @@ class AdvisoryMicrosoftDriverBlockList(BaseModel): """ # noqa: E501 date_added: Optional[StrictStr] = None file_id: Optional[StrictStr] = Field(default=None, description="From FileAttrib or Deny") - file_metadata: Optional[AdvisoryMicrosoftFileMetadata] = Field(default=None, description="File-level metadata") + file_metadata: Optional[AdvisoryMicrosoftFileMetadata] = None __properties: ClassVar[List[str]] = ["date_added", "file_id", "file_metadata"] model_config = ConfigDict( diff --git a/vulncheck_sdk/aio/models/advisory_microsoft_file_metadata.py b/vulncheck_sdk/aio/models/advisory_microsoft_file_metadata.py index 6bd15b5a..3b890ed9 100644 --- a/vulncheck_sdk/aio/models/advisory_microsoft_file_metadata.py +++ b/vulncheck_sdk/aio/models/advisory_microsoft_file_metadata.py @@ -25,7 +25,7 @@ class AdvisoryMicrosoftFileMetadata(BaseModel): """ - AdvisoryMicrosoftFileMetadata + File-level metadata """ # noqa: E501 file_name: Optional[StrictStr] = Field(default=None, description="Full path (FilePath + FileName or FriendlyName)") maximum_file_version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_product_branch.py b/vulncheck_sdk/aio/models/advisory_product_branch.py index 502bacf4..c57e89c2 100644 --- a/vulncheck_sdk/aio/models/advisory_product_branch.py +++ b/vulncheck_sdk/aio/models/advisory_product_branch.py @@ -27,7 +27,7 @@ class AdvisoryProductBranch(BaseModel): """ - AdvisoryProductBranch + ProductTree contains information about the product tree (branches only). https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property """ # noqa: E501 branches: Optional[List[AdvisoryProductBranch]] = None category: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/advisory_product_tree.py b/vulncheck_sdk/aio/models/advisory_product_tree.py deleted file mode 100644 index 3d7e104a..00000000 --- a/vulncheck_sdk/aio/models/advisory_product_tree.py +++ /dev/null @@ -1,96 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.aio.models.advisory_relationship import AdvisoryRelationship -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryProductTree(BaseModel): - """ - AdvisoryProductTree - """ # noqa: E501 - relationships: Optional[List[AdvisoryRelationship]] = None - __properties: ClassVar[List[str]] = ["relationships"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryProductTree from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - # override the default output from pydantic by calling `to_dict()` of each item in relationships (list) - _items = [] - if self.relationships: - for _item_relationships in self.relationships: - if _item_relationships: - _items.append(_item_relationships.to_dict()) - _dict['relationships'] = _items - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryProductTree from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "relationships": [AdvisoryRelationship.from_dict(_item) for _item in obj["relationships"]] if obj.get("relationships") is not None else None - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_relationship.py b/vulncheck_sdk/aio/models/advisory_relationship.py deleted file mode 100644 index d921e8c5..00000000 --- a/vulncheck_sdk/aio/models/advisory_relationship.py +++ /dev/null @@ -1,92 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryRelationship(BaseModel): - """ - AdvisoryRelationship - """ # noqa: E501 - product_reference: Optional[StrictStr] = Field(default=None, alias="productReference") - relates_to_product_reference: Optional[StrictStr] = Field(default=None, alias="relatesToProductReference") - relation_type: Optional[StrictStr] = Field(default=None, alias="relationType") - __properties: ClassVar[List[str]] = ["productReference", "relatesToProductReference", "relationType"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryRelationship from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryRelationship from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "productReference": obj.get("productReference"), - "relatesToProductReference": obj.get("relatesToProductReference"), - "relationType": obj.get("relationType") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_revision.py b/vulncheck_sdk/aio/models/advisory_revision.py deleted file mode 100644 index 66a2d956..00000000 --- a/vulncheck_sdk/aio/models/advisory_revision.py +++ /dev/null @@ -1,92 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryRevision(BaseModel): - """ - AdvisoryRevision - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - description: Optional[StrictStr] = None - number: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["date", "description", "number"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryRevision from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryRevision from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date"), - "description": obj.get("description"), - "number": obj.get("number") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_score_set.py b/vulncheck_sdk/aio/models/advisory_score_set.py deleted file mode 100644 index 3de08b7f..00000000 --- a/vulncheck_sdk/aio/models/advisory_score_set.py +++ /dev/null @@ -1,90 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryScoreSet(BaseModel): - """ - AdvisoryScoreSet - """ # noqa: E501 - base_score: Optional[StrictStr] = Field(default=None, alias="baseScore") - vector: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["baseScore", "vector"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryScoreSet from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryScoreSet from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "baseScore": obj.get("baseScore"), - "vector": obj.get("vector") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_status.py b/vulncheck_sdk/aio/models/advisory_status.py deleted file mode 100644 index 12b62e4a..00000000 --- a/vulncheck_sdk/aio/models/advisory_status.py +++ /dev/null @@ -1,90 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryStatus(BaseModel): - """ - AdvisoryStatus - """ # noqa: E501 - product_id: Optional[List[StrictStr]] = Field(default=None, alias="productID") - type: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["productID", "type"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryStatus from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryStatus from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "productID": obj.get("productID"), - "type": obj.get("type") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_threat.py b/vulncheck_sdk/aio/models/advisory_threat.py deleted file mode 100644 index dab6ea5e..00000000 --- a/vulncheck_sdk/aio/models/advisory_threat.py +++ /dev/null @@ -1,90 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryThreat(BaseModel): - """ - AdvisoryThreat - """ # noqa: E501 - severity: Optional[StrictStr] = None - type: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["severity", "type"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryThreat from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryThreat from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "severity": obj.get("severity"), - "type": obj.get("type") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_update.py b/vulncheck_sdk/aio/models/advisory_update.py index 1ef80b6d..d0a2439b 100644 --- a/vulncheck_sdk/aio/models/advisory_update.py +++ b/vulncheck_sdk/aio/models/advisory_update.py @@ -20,7 +20,6 @@ from pydantic import BaseModel, ConfigDict, Field, StrictStr from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.aio.models.advisory_date_time import AdvisoryDateTime from vulncheck_sdk.aio.models.advisory_package import AdvisoryPackage from vulncheck_sdk.aio.models.advisory_reference import AdvisoryReference from typing import Optional, Set @@ -34,7 +33,7 @@ class AdvisoryUpdate(BaseModel): date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None id: Optional[StrictStr] = Field(default=None, description="sort // key") - issued: Optional[AdvisoryDateTime] = None + issued: Optional[Dict[str, Any]] = None os_arch: Optional[StrictStr] = None os_version: Optional[StrictStr] = None packages: Optional[List[AdvisoryPackage]] = None @@ -42,7 +41,7 @@ class AdvisoryUpdate(BaseModel): severity: Optional[StrictStr] = None title: Optional[StrictStr] = None type: Optional[StrictStr] = None - updated: Optional[AdvisoryDateTime] = None + updated: Optional[Dict[str, Any]] = None __properties: ClassVar[List[str]] = ["cve", "date_added", "description", "id", "issued", "os_arch", "os_version", "packages", "references", "severity", "title", "type", "updated"] model_config = ConfigDict( @@ -84,9 +83,6 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of issued - if self.issued: - _dict['issued'] = self.issued.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in packages (list) _items = [] if self.packages: @@ -101,9 +97,6 @@ def to_dict(self) -> Dict[str, Any]: if _item_references: _items.append(_item_references.to_dict()) _dict['references'] = _items - # override the default output from pydantic by calling `to_dict()` of updated - if self.updated: - _dict['updated'] = self.updated.to_dict() return _dict @classmethod @@ -120,7 +113,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "date_added": obj.get("date_added"), "description": obj.get("description"), "id": obj.get("id"), - "issued": AdvisoryDateTime.from_dict(obj["issued"]) if obj.get("issued") is not None else None, + "issued": obj.get("issued"), "os_arch": obj.get("os_arch"), "os_version": obj.get("os_version"), "packages": [AdvisoryPackage.from_dict(_item) for _item in obj["packages"]] if obj.get("packages") is not None else None, @@ -128,7 +121,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "severity": obj.get("severity"), "title": obj.get("title"), "type": obj.get("type"), - "updated": AdvisoryDateTime.from_dict(obj["updated"]) if obj.get("updated") is not None else None + "updated": obj.get("updated") }) return _obj diff --git a/vulncheck_sdk/aio/models/advisory_updated.py b/vulncheck_sdk/aio/models/advisory_updated.py deleted file mode 100644 index 7d63dbe0..00000000 --- a/vulncheck_sdk/aio/models/advisory_updated.py +++ /dev/null @@ -1,88 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryUpdated(BaseModel): - """ - AdvisoryUpdated - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - __properties: ClassVar[List[str]] = ["date"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryUpdated from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryUpdated from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/advisory_vulnerability.py b/vulncheck_sdk/aio/models/advisory_vulnerability.py deleted file mode 100644 index 8303990b..00000000 --- a/vulncheck_sdk/aio/models/advisory_vulnerability.py +++ /dev/null @@ -1,136 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.aio.models.advisory_cvrf_reference import AdvisoryCVRFReference -from vulncheck_sdk.aio.models.advisory_score_set import AdvisoryScoreSet -from vulncheck_sdk.aio.models.advisory_status import AdvisoryStatus -from vulncheck_sdk.aio.models.advisory_threat import AdvisoryThreat -from vulncheck_sdk.aio.models.advisory_vuln_check_package import AdvisoryVulnCheckPackage -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryVulnerability(BaseModel): - """ - AdvisoryVulnerability - """ # noqa: E501 - cve: Optional[StrictStr] = None - cvssscore_sets: Optional[AdvisoryScoreSet] = Field(default=None, alias="cvssscoreSets") - description: Optional[StrictStr] = None - packages: Optional[List[AdvisoryVulnCheckPackage]] = Field(default=None, description="vulncheck addition") - product_statuses: Optional[List[AdvisoryStatus]] = Field(default=None, alias="productStatuses") - references: Optional[List[AdvisoryCVRFReference]] = None - threats: Optional[List[AdvisoryThreat]] = None - __properties: ClassVar[List[str]] = ["cve", "cvssscoreSets", "description", "packages", "productStatuses", "references", "threats"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryVulnerability from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - # override the default output from pydantic by calling `to_dict()` of cvssscore_sets - if self.cvssscore_sets: - _dict['cvssscoreSets'] = self.cvssscore_sets.to_dict() - # override the default output from pydantic by calling `to_dict()` of each item in packages (list) - _items = [] - if self.packages: - for _item_packages in self.packages: - if _item_packages: - _items.append(_item_packages.to_dict()) - _dict['packages'] = _items - # override the default output from pydantic by calling `to_dict()` of each item in product_statuses (list) - _items = [] - if self.product_statuses: - for _item_product_statuses in self.product_statuses: - if _item_product_statuses: - _items.append(_item_product_statuses.to_dict()) - _dict['productStatuses'] = _items - # override the default output from pydantic by calling `to_dict()` of each item in references (list) - _items = [] - if self.references: - for _item_references in self.references: - if _item_references: - _items.append(_item_references.to_dict()) - _dict['references'] = _items - # override the default output from pydantic by calling `to_dict()` of each item in threats (list) - _items = [] - if self.threats: - for _item_threats in self.threats: - if _item_threats: - _items.append(_item_threats.to_dict()) - _dict['threats'] = _items - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryVulnerability from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "cve": obj.get("cve"), - "cvssscoreSets": AdvisoryScoreSet.from_dict(obj["cvssscoreSets"]) if obj.get("cvssscoreSets") is not None else None, - "description": obj.get("description"), - "packages": [AdvisoryVulnCheckPackage.from_dict(_item) for _item in obj["packages"]] if obj.get("packages") is not None else None, - "productStatuses": [AdvisoryStatus.from_dict(_item) for _item in obj["productStatuses"]] if obj.get("productStatuses") is not None else None, - "references": [AdvisoryCVRFReference.from_dict(_item) for _item in obj["references"]] if obj.get("references") is not None else None, - "threats": [AdvisoryThreat.from_dict(_item) for _item in obj["threats"]] if obj.get("threats") is not None else None - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/api_date_time.py b/vulncheck_sdk/aio/models/api_date_time.py deleted file mode 100644 index 1fd4a11d..00000000 --- a/vulncheck_sdk/aio/models/api_date_time.py +++ /dev/null @@ -1,88 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class ApiDateTime(BaseModel): - """ - ApiDateTime - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - __properties: ClassVar[List[str]] = ["date"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of ApiDateTime from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of ApiDateTime from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date") - }) - return _obj - - diff --git a/vulncheck_sdk/aio/models/api_epss.py b/vulncheck_sdk/aio/models/api_epss.py index 3b5069f3..d38fb8a8 100644 --- a/vulncheck_sdk/aio/models/api_epss.py +++ b/vulncheck_sdk/aio/models/api_epss.py @@ -25,7 +25,7 @@ class ApiEPSS(BaseModel): """ - ApiEPSS + exclude EPSS from changelog """ # noqa: E501 epss_percentile: Optional[Union[StrictFloat, StrictInt]] = None epss_score: Optional[Union[StrictFloat, StrictInt]] = None diff --git a/vulncheck_sdk/aio/models/api_exploit_v3_result.py b/vulncheck_sdk/aio/models/api_exploit_v3_result.py index b05c6886..e858ea9d 100644 --- a/vulncheck_sdk/aio/models/api_exploit_v3_result.py +++ b/vulncheck_sdk/aio/models/api_exploit_v3_result.py @@ -37,7 +37,7 @@ class ApiExploitV3Result(BaseModel): commercial_exploit_found: Optional[StrictBool] = None counts: Optional[ApiExploitsV3Count] = None date_added: Optional[StrictStr] = None - epss: Optional[ApiEPSS] = Field(default=None, description="exclude EPSS from changelog") + epss: Optional[ApiEPSS] = None exploits: Optional[List[ApiNormalizedExploitV3Entry]] = None id: Optional[StrictStr] = None in_kev: Optional[StrictBool] = Field(default=None, alias="inKEV") diff --git a/vulncheck_sdk/aio/models/api_exploits_change.py b/vulncheck_sdk/aio/models/api_exploits_change.py index 185c98cc..85315dbf 100644 --- a/vulncheck_sdk/aio/models/api_exploits_change.py +++ b/vulncheck_sdk/aio/models/api_exploits_change.py @@ -30,8 +30,8 @@ class ApiExploitsChange(BaseModel): change_time: Optional[StrictStr] = None change_type: Optional[StrictStr] = None var_field: Optional[StrictStr] = Field(default=None, alias="field") - new_value: Optional[Dict[str, Any]] = None - old_value: Optional[Dict[str, Any]] = None + new_value: Optional[Any] = None + old_value: Optional[Any] = None __properties: ClassVar[List[str]] = ["change_time", "change_type", "field", "new_value", "old_value"] model_config = ConfigDict( @@ -73,6 +73,16 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) + # set to None if new_value (nullable) is None + # and model_fields_set contains the field + if self.new_value is None and "new_value" in self.model_fields_set: + _dict['new_value'] = None + + # set to None if old_value (nullable) is None + # and model_fields_set contains the field + if self.old_value is None and "old_value" in self.model_fields_set: + _dict['old_value'] = None + return _dict @classmethod diff --git a/vulncheck_sdk/aio/models/api_impact.py b/vulncheck_sdk/aio/models/api_impact.py index 4c7a20d8..db24f89f 100644 --- a/vulncheck_sdk/aio/models/api_impact.py +++ b/vulncheck_sdk/aio/models/api_impact.py @@ -32,7 +32,7 @@ class ApiImpact(BaseModel): """ # noqa: E501 base_metric_v2: Optional[ApiBaseMetricV2] = Field(default=None, alias="baseMetricV2") base_metric_v3: Optional[ApiBaseMetricV3] = Field(default=None, alias="baseMetricV3") - metric_v40: Optional[AdvisoryCVSSV40] = Field(default=None, description="this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics", alias="metricV40") + metric_v40: Optional[AdvisoryCVSSV40] = Field(default=None, alias="metricV40") __properties: ClassVar[List[str]] = ["baseMetricV2", "baseMetricV3", "metricV40"] model_config = ConfigDict( diff --git a/vulncheck_sdk/aio/models/api_update.py b/vulncheck_sdk/aio/models/api_update.py index 83142502..b3f97e7c 100644 --- a/vulncheck_sdk/aio/models/api_update.py +++ b/vulncheck_sdk/aio/models/api_update.py @@ -20,7 +20,6 @@ from pydantic import BaseModel, ConfigDict, Field, StrictStr from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.aio.models.api_date_time import ApiDateTime from vulncheck_sdk.aio.models.api_package import ApiPackage from vulncheck_sdk.aio.models.api_reference import ApiReference from typing import Optional, Set @@ -34,7 +33,7 @@ class ApiUpdate(BaseModel): date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None id: Optional[StrictStr] = Field(default=None, description="sort // key") - issued: Optional[ApiDateTime] = None + issued: Optional[Dict[str, Any]] = None os_arch: Optional[StrictStr] = None os_version: Optional[StrictStr] = None packages: Optional[List[ApiPackage]] = None @@ -42,7 +41,7 @@ class ApiUpdate(BaseModel): severity: Optional[StrictStr] = None title: Optional[StrictStr] = None type: Optional[StrictStr] = None - updated: Optional[ApiDateTime] = None + updated: Optional[Dict[str, Any]] = None __properties: ClassVar[List[str]] = ["cve", "date_added", "description", "id", "issued", "os_arch", "os_version", "packages", "references", "severity", "title", "type", "updated"] model_config = ConfigDict( @@ -84,9 +83,6 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of issued - if self.issued: - _dict['issued'] = self.issued.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in packages (list) _items = [] if self.packages: @@ -101,9 +97,6 @@ def to_dict(self) -> Dict[str, Any]: if _item_references: _items.append(_item_references.to_dict()) _dict['references'] = _items - # override the default output from pydantic by calling `to_dict()` of updated - if self.updated: - _dict['updated'] = self.updated.to_dict() return _dict @classmethod @@ -120,7 +113,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "date_added": obj.get("date_added"), "description": obj.get("description"), "id": obj.get("id"), - "issued": ApiDateTime.from_dict(obj["issued"]) if obj.get("issued") is not None else None, + "issued": obj.get("issued"), "os_arch": obj.get("os_arch"), "os_version": obj.get("os_version"), "packages": [ApiPackage.from_dict(_item) for _item in obj["packages"]] if obj.get("packages") is not None else None, @@ -128,7 +121,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "severity": obj.get("severity"), "title": obj.get("title"), "type": obj.get("type"), - "updated": ApiDateTime.from_dict(obj["updated"]) if obj.get("updated") is not None else None + "updated": obj.get("updated") }) return _obj diff --git a/vulncheck_sdk/aio/models/purl_batch_vuln_finding.py b/vulncheck_sdk/aio/models/purl_batch_vuln_finding.py index 534a8e9c..4f23e3c7 100644 --- a/vulncheck_sdk/aio/models/purl_batch_vuln_finding.py +++ b/vulncheck_sdk/aio/models/purl_batch_vuln_finding.py @@ -32,7 +32,7 @@ class PurlBatchVulnFinding(BaseModel): """ # noqa: E501 cves: Optional[List[StrictStr]] = Field(default=None, description="list of associated CVE 's") purl: Optional[StrictStr] = Field(default=None, description="the purl, ex. hex/coherence@0.1.2") - purl_struct: Optional[PurlPackageURLJSON] = Field(default=None, description="meta-data about the purl") + purl_struct: Optional[PurlPackageURLJSON] = None research_attributes: Optional[ApiOSSPackageResearchAttributes] = None vulnerabilities: Optional[List[ApiOSSPackageVulnerability]] = Field(default=None, description="list of associated vulnerabilities") __properties: ClassVar[List[str]] = ["cves", "purl", "purl_struct", "research_attributes", "vulnerabilities"] diff --git a/vulncheck_sdk/aio/models/purl_package_urljson.py b/vulncheck_sdk/aio/models/purl_package_urljson.py index b2aa3310..93c1e32c 100644 --- a/vulncheck_sdk/aio/models/purl_package_urljson.py +++ b/vulncheck_sdk/aio/models/purl_package_urljson.py @@ -26,7 +26,7 @@ class PurlPackageURLJSON(BaseModel): """ - PurlPackageURLJSON + meta-data about the purl """ # noqa: E501 name: Optional[StrictStr] = None namespace: Optional[StrictStr] = None diff --git a/vulncheck_sdk/aio/models/v3controllers_purl_response_metadata.py b/vulncheck_sdk/aio/models/v3controllers_purl_response_metadata.py index 72235c4f..b353c740 100644 --- a/vulncheck_sdk/aio/models/v3controllers_purl_response_metadata.py +++ b/vulncheck_sdk/aio/models/v3controllers_purl_response_metadata.py @@ -28,7 +28,7 @@ class V3controllersPurlResponseMetadata(BaseModel): """ V3controllersPurlResponseMetadata """ # noqa: E501 - purl_struct: Optional[PurlPackageURLJSON] = Field(default=None, description="meta-data about the purl") + purl_struct: Optional[PurlPackageURLJSON] = None timestamp: Optional[StrictStr] = Field(default=None, description="time of the transaction") total_documents: Optional[StrictInt] = Field(default=None, description="number of results found") __properties: ClassVar[List[str]] = ["purl_struct", "timestamp", "total_documents"] diff --git a/vulncheck_sdk/api/endpoints_api.py b/vulncheck_sdk/api/endpoints_api.py index f9f530fb..5af5963b 100644 --- a/vulncheck_sdk/api/endpoints_api.py +++ b/vulncheck_sdk/api/endpoints_api.py @@ -2145,7 +2145,7 @@ def _purl_get_serialize( @validate_call def purls_post( self, - purls: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], + request_body: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], _request_timeout: Union[ None, Annotated[StrictFloat, Field(gt=0)], @@ -2163,8 +2163,8 @@ def purls_post( Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities - :param purls: PURL strings used to identify and locate software packages (required) - :type purls: List[str] + :param request_body: PURL strings used to identify and locate software packages (required) + :type request_body: List[str] :param _request_timeout: timeout setting for this request. If one number provided, it will be total request timeout. It can also be a pair (tuple) of @@ -2188,7 +2188,7 @@ def purls_post( """ # noqa: E501 _param = self._purls_post_serialize( - purls=purls, + request_body=request_body, _request_auth=_request_auth, _content_type=_content_type, _headers=_headers, @@ -2214,7 +2214,7 @@ def purls_post( @validate_call def purls_post_with_http_info( self, - purls: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], + request_body: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], _request_timeout: Union[ None, Annotated[StrictFloat, Field(gt=0)], @@ -2232,8 +2232,8 @@ def purls_post_with_http_info( Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities - :param purls: PURL strings used to identify and locate software packages (required) - :type purls: List[str] + :param request_body: PURL strings used to identify and locate software packages (required) + :type request_body: List[str] :param _request_timeout: timeout setting for this request. If one number provided, it will be total request timeout. It can also be a pair (tuple) of @@ -2257,7 +2257,7 @@ def purls_post_with_http_info( """ # noqa: E501 _param = self._purls_post_serialize( - purls=purls, + request_body=request_body, _request_auth=_request_auth, _content_type=_content_type, _headers=_headers, @@ -2283,7 +2283,7 @@ def purls_post_with_http_info( @validate_call def purls_post_without_preload_content( self, - purls: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], + request_body: Annotated[List[StrictStr], Field(description="PURL strings used to identify and locate software packages")], _request_timeout: Union[ None, Annotated[StrictFloat, Field(gt=0)], @@ -2301,8 +2301,8 @@ def purls_post_without_preload_content( Accepts a JSON array of PURLs in the request body and returns a list of vulnerabilities - :param purls: PURL strings used to identify and locate software packages (required) - :type purls: List[str] + :param request_body: PURL strings used to identify and locate software packages (required) + :type request_body: List[str] :param _request_timeout: timeout setting for this request. If one number provided, it will be total request timeout. It can also be a pair (tuple) of @@ -2326,7 +2326,7 @@ def purls_post_without_preload_content( """ # noqa: E501 _param = self._purls_post_serialize( - purls=purls, + request_body=request_body, _request_auth=_request_auth, _content_type=_content_type, _headers=_headers, @@ -2347,7 +2347,7 @@ def purls_post_without_preload_content( def _purls_post_serialize( self, - purls, + request_body, _request_auth, _content_type, _headers, @@ -2357,7 +2357,7 @@ def _purls_post_serialize( _host = None _collection_formats: Dict[str, str] = { - 'purls': '', + 'request_body': '', } _path_params: Dict[str, str] = {} @@ -2374,8 +2374,8 @@ def _purls_post_serialize( # process the header parameters # process the form parameters # process the body parameter - if purls is not None: - _body_params = purls + if request_body is not None: + _body_params = request_body # set the HTTP header `Accept` @@ -2386,6 +2386,19 @@ def _purls_post_serialize( ] ) + # set the HTTP header `Content-Type` + if _content_type: + _header_params['Content-Type'] = _content_type + else: + _default_content_type = ( + self.api_client.select_header_content_type( + [ + 'application/json' + ] + ) + ) + if _default_content_type is not None: + _header_params['Content-Type'] = _default_content_type # authentication setting _auth_settings: List[str] = [ diff --git a/vulncheck_sdk/api/indices_api.py b/vulncheck_sdk/api/indices_api.py index 4837b1ac..537631ee 100644 --- a/vulncheck_sdk/api/indices_api.py +++ b/vulncheck_sdk/api/indices_api.py @@ -519,8 +519,7 @@ def index7zip_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -578,10 +577,8 @@ def index7zip_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -635,7 +632,6 @@ def index7zip_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -684,8 +680,7 @@ def index7zip_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -743,10 +738,8 @@ def index7zip_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -800,7 +793,6 @@ def index7zip_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -849,8 +841,7 @@ def index7zip_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -908,10 +899,8 @@ def index7zip_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -965,7 +954,6 @@ def index7zip_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -1010,7 +998,6 @@ def _index7zip_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -1111,10 +1098,6 @@ def _index7zip_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -1196,8 +1179,7 @@ def index_a10_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -1255,10 +1237,8 @@ def index_a10_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -1312,7 +1292,6 @@ def index_a10_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -1361,8 +1340,7 @@ def index_a10_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -1420,10 +1398,8 @@ def index_a10_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -1477,7 +1453,6 @@ def index_a10_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -1526,8 +1501,7 @@ def index_a10_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -1585,10 +1559,8 @@ def index_a10_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -1642,7 +1614,6 @@ def index_a10_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -1687,7 +1658,6 @@ def _index_a10_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -1788,10 +1758,6 @@ def _index_a10_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -1873,8 +1839,7 @@ def index_abb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -1932,10 +1897,8 @@ def index_abb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -1989,7 +1952,6 @@ def index_abb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2038,8 +2000,7 @@ def index_abb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2097,10 +2058,8 @@ def index_abb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2154,7 +2113,6 @@ def index_abb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2203,8 +2161,7 @@ def index_abb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2262,10 +2219,8 @@ def index_abb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2319,7 +2274,6 @@ def index_abb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2364,7 +2318,6 @@ def _index_abb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -2465,10 +2418,6 @@ def _index_abb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -2550,8 +2499,7 @@ def index_abbott_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2609,10 +2557,8 @@ def index_abbott_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2666,7 +2612,6 @@ def index_abbott_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2715,8 +2660,7 @@ def index_abbott_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2774,10 +2718,8 @@ def index_abbott_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2831,7 +2773,6 @@ def index_abbott_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -2880,8 +2821,7 @@ def index_abbott_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -2939,10 +2879,8 @@ def index_abbott_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -2996,7 +2934,6 @@ def index_abbott_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -3041,7 +2978,6 @@ def _index_abbott_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -3142,10 +3078,6 @@ def _index_abbott_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -3227,8 +3159,7 @@ def index_absolute_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -3286,10 +3217,8 @@ def index_absolute_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -3343,7 +3272,6 @@ def index_absolute_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -3392,8 +3320,7 @@ def index_absolute_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -3451,10 +3378,8 @@ def index_absolute_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -3508,7 +3433,6 @@ def index_absolute_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -3557,8 +3481,7 @@ def index_absolute_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -3616,10 +3539,8 @@ def index_absolute_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -3673,7 +3594,6 @@ def index_absolute_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -3718,7 +3638,6 @@ def _index_absolute_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -3819,10 +3738,6 @@ def _index_absolute_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -3904,8 +3819,7 @@ def index_acronis_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -3963,10 +3877,8 @@ def index_acronis_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4020,7 +3932,6 @@ def index_acronis_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4069,8 +3980,7 @@ def index_acronis_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4128,10 +4038,8 @@ def index_acronis_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4185,7 +4093,6 @@ def index_acronis_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4234,8 +4141,7 @@ def index_acronis_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4293,10 +4199,8 @@ def index_acronis_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4350,7 +4254,6 @@ def index_acronis_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4395,7 +4298,6 @@ def _index_acronis_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -4496,10 +4398,6 @@ def _index_acronis_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -4581,8 +4479,7 @@ def index_adobe_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4640,10 +4537,8 @@ def index_adobe_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4697,7 +4592,6 @@ def index_adobe_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4746,8 +4640,7 @@ def index_adobe_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4805,10 +4698,8 @@ def index_adobe_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -4862,7 +4753,6 @@ def index_adobe_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -4911,8 +4801,7 @@ def index_adobe_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -4970,10 +4859,8 @@ def index_adobe_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -5027,7 +4914,6 @@ def index_adobe_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -5072,7 +4958,6 @@ def _index_adobe_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -5173,10 +5058,6 @@ def _index_adobe_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -5258,8 +5139,7 @@ def index_advantech_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -5317,10 +5197,8 @@ def index_advantech_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -5374,7 +5252,6 @@ def index_advantech_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -5423,8 +5300,7 @@ def index_advantech_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -5482,10 +5358,8 @@ def index_advantech_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -5539,7 +5413,6 @@ def index_advantech_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -5588,8 +5461,7 @@ def index_advantech_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -5647,10 +5519,8 @@ def index_advantech_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -5704,7 +5574,6 @@ def index_advantech_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -5749,7 +5618,6 @@ def _index_advantech_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -5850,10 +5718,6 @@ def _index_advantech_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -5935,8 +5799,7 @@ def index_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -5994,10 +5857,8 @@ def index_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6051,7 +5912,6 @@ def index_advisories_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6100,8 +5960,7 @@ def index_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6159,10 +6018,8 @@ def index_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6216,7 +6073,6 @@ def index_advisories_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6265,8 +6121,7 @@ def index_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6324,10 +6179,8 @@ def index_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6381,7 +6234,6 @@ def index_advisories_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6426,7 +6278,6 @@ def _index_advisories_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -6527,10 +6378,6 @@ def _index_advisories_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -6612,8 +6459,7 @@ def index_aix_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6671,10 +6517,8 @@ def index_aix_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6728,7 +6572,6 @@ def index_aix_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6777,8 +6620,7 @@ def index_aix_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -6836,10 +6678,8 @@ def index_aix_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -6893,7 +6733,6 @@ def index_aix_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -6942,8 +6781,7 @@ def index_aix_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -7001,10 +6839,8 @@ def index_aix_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -7058,7 +6894,6 @@ def index_aix_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -7103,7 +6938,6 @@ def _index_aix_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -7204,10 +7038,6 @@ def _index_aix_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -7289,8 +7119,7 @@ def index_aleph_research_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -7348,10 +7177,8 @@ def index_aleph_research_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -7405,7 +7232,6 @@ def index_aleph_research_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -7454,8 +7280,7 @@ def index_aleph_research_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -7513,10 +7338,8 @@ def index_aleph_research_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -7570,7 +7393,6 @@ def index_aleph_research_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -7619,8 +7441,7 @@ def index_aleph_research_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -7678,10 +7499,8 @@ def index_aleph_research_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -7735,7 +7554,6 @@ def index_aleph_research_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -7780,7 +7598,6 @@ def _index_aleph_research_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -7881,10 +7698,6 @@ def _index_aleph_research_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -7966,8 +7779,7 @@ def index_alibaba_advs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8025,10 +7837,8 @@ def index_alibaba_advs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8082,7 +7892,6 @@ def index_alibaba_advs_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8131,8 +7940,7 @@ def index_alibaba_advs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8190,10 +7998,8 @@ def index_alibaba_advs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8247,7 +8053,6 @@ def index_alibaba_advs_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8296,8 +8101,7 @@ def index_alibaba_advs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8355,10 +8159,8 @@ def index_alibaba_advs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8412,7 +8214,6 @@ def index_alibaba_advs_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8457,7 +8258,6 @@ def _index_alibaba_advs_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -8558,10 +8358,6 @@ def _index_alibaba_advs_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -8643,8 +8439,7 @@ def index_alma_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8702,10 +8497,8 @@ def index_alma_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8759,7 +8552,6 @@ def index_alma_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8808,8 +8600,7 @@ def index_alma_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -8867,10 +8658,8 @@ def index_alma_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -8924,7 +8713,6 @@ def index_alma_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -8973,8 +8761,7 @@ def index_alma_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -9032,10 +8819,8 @@ def index_alma_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -9089,7 +8874,6 @@ def index_alma_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -9134,7 +8918,6 @@ def _index_alma_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -9235,10 +9018,6 @@ def _index_alma_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -9320,8 +9099,7 @@ def index_alpine_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -9379,10 +9157,8 @@ def index_alpine_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -9436,7 +9212,6 @@ def index_alpine_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -9485,8 +9260,7 @@ def index_alpine_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -9544,10 +9318,8 @@ def index_alpine_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -9601,7 +9373,6 @@ def index_alpine_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -9650,8 +9421,7 @@ def index_alpine_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -9709,10 +9479,8 @@ def index_alpine_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -9766,7 +9534,6 @@ def index_alpine_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -9811,7 +9578,6 @@ def _index_alpine_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -9912,10 +9678,6 @@ def _index_alpine_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -9997,8 +9759,7 @@ def index_alpine_purls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10056,10 +9817,8 @@ def index_alpine_purls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10113,7 +9872,6 @@ def index_alpine_purls_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -10162,8 +9920,7 @@ def index_alpine_purls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10221,10 +9978,8 @@ def index_alpine_purls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10278,7 +10033,6 @@ def index_alpine_purls_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -10327,8 +10081,7 @@ def index_alpine_purls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10386,10 +10139,8 @@ def index_alpine_purls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10443,7 +10194,6 @@ def index_alpine_purls_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -10488,7 +10238,6 @@ def _index_alpine_purls_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -10589,10 +10338,6 @@ def _index_alpine_purls_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -10674,8 +10419,7 @@ def index_amazon_cve_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10733,10 +10477,8 @@ def index_amazon_cve_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10790,7 +10532,6 @@ def index_amazon_cve_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -10839,8 +10580,7 @@ def index_amazon_cve_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -10898,10 +10638,8 @@ def index_amazon_cve_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -10955,7 +10693,6 @@ def index_amazon_cve_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11004,8 +10741,7 @@ def index_amazon_cve_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -11063,10 +10799,8 @@ def index_amazon_cve_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -11120,7 +10854,6 @@ def index_amazon_cve_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11165,7 +10898,6 @@ def _index_amazon_cve_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -11266,10 +10998,6 @@ def _index_amazon_cve_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -11351,8 +11079,7 @@ def index_amazon_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -11410,10 +11137,8 @@ def index_amazon_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -11467,7 +11192,6 @@ def index_amazon_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11516,8 +11240,7 @@ def index_amazon_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -11575,10 +11298,8 @@ def index_amazon_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -11632,7 +11353,6 @@ def index_amazon_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11681,8 +11401,7 @@ def index_amazon_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -11740,10 +11459,8 @@ def index_amazon_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -11797,7 +11514,6 @@ def index_amazon_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -11842,7 +11558,6 @@ def _index_amazon_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -11943,10 +11658,6 @@ def _index_amazon_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -12028,8 +11739,7 @@ def index_amd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12087,10 +11797,8 @@ def index_amd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12144,7 +11852,6 @@ def index_amd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -12193,8 +11900,7 @@ def index_amd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12252,10 +11958,8 @@ def index_amd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12309,7 +12013,6 @@ def index_amd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -12358,8 +12061,7 @@ def index_amd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12417,10 +12119,8 @@ def index_amd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12474,7 +12174,6 @@ def index_amd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -12519,7 +12218,6 @@ def _index_amd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -12620,10 +12318,6 @@ def _index_amd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -12705,8 +12399,7 @@ def index_ami_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12764,10 +12457,8 @@ def index_ami_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12821,7 +12512,6 @@ def index_ami_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -12870,8 +12560,7 @@ def index_ami_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -12929,10 +12618,8 @@ def index_ami_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -12986,7 +12673,6 @@ def index_ami_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13035,8 +12721,7 @@ def index_ami_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -13094,10 +12779,8 @@ def index_ami_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -13151,7 +12834,6 @@ def index_ami_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13196,7 +12878,6 @@ def _index_ami_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -13297,10 +12978,6 @@ def _index_ami_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -13382,8 +13059,7 @@ def index_anchore_nvd_override_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -13441,10 +13117,8 @@ def index_anchore_nvd_override_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -13498,7 +13172,6 @@ def index_anchore_nvd_override_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13547,8 +13220,7 @@ def index_anchore_nvd_override_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -13606,10 +13278,8 @@ def index_anchore_nvd_override_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -13663,7 +13333,6 @@ def index_anchore_nvd_override_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13712,8 +13381,7 @@ def index_anchore_nvd_override_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -13771,10 +13439,8 @@ def index_anchore_nvd_override_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -13828,7 +13494,6 @@ def index_anchore_nvd_override_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -13873,7 +13538,6 @@ def _index_anchore_nvd_override_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -13974,10 +13638,6 @@ def _index_anchore_nvd_override_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -14059,8 +13719,7 @@ def index_android_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14118,10 +13777,8 @@ def index_android_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -14175,7 +13832,6 @@ def index_android_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -14224,8 +13880,7 @@ def index_android_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14283,10 +13938,8 @@ def index_android_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -14340,7 +13993,6 @@ def index_android_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -14389,8 +14041,7 @@ def index_android_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14448,10 +14099,8 @@ def index_android_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -14505,7 +14154,6 @@ def index_android_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -14550,7 +14198,6 @@ def _index_android_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -14651,10 +14298,6 @@ def _index_android_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -14736,8 +14379,7 @@ def index_apache_activemq_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14795,10 +14437,8 @@ def index_apache_activemq_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -14852,7 +14492,6 @@ def index_apache_activemq_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -14901,8 +14540,7 @@ def index_apache_activemq_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -14960,10 +14598,8 @@ def index_apache_activemq_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15017,7 +14653,6 @@ def index_apache_activemq_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15066,8 +14701,7 @@ def index_apache_activemq_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -15125,10 +14759,8 @@ def index_apache_activemq_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15182,7 +14814,6 @@ def index_apache_activemq_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15227,7 +14858,6 @@ def _index_apache_activemq_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -15328,10 +14958,6 @@ def _index_apache_activemq_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -15413,8 +15039,7 @@ def index_apache_archiva_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -15472,10 +15097,8 @@ def index_apache_archiva_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15529,7 +15152,6 @@ def index_apache_archiva_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15578,8 +15200,7 @@ def index_apache_archiva_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -15637,10 +15258,8 @@ def index_apache_archiva_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15694,7 +15313,6 @@ def index_apache_archiva_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15743,8 +15361,7 @@ def index_apache_archiva_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -15802,10 +15419,8 @@ def index_apache_archiva_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -15859,7 +15474,6 @@ def index_apache_archiva_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -15904,7 +15518,6 @@ def _index_apache_archiva_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -16005,10 +15618,6 @@ def _index_apache_archiva_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -16090,8 +15699,7 @@ def index_apache_arrow_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16149,10 +15757,8 @@ def index_apache_arrow_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -16206,7 +15812,6 @@ def index_apache_arrow_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -16255,8 +15860,7 @@ def index_apache_arrow_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16314,10 +15918,8 @@ def index_apache_arrow_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -16371,7 +15973,6 @@ def index_apache_arrow_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -16420,8 +16021,7 @@ def index_apache_arrow_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16479,10 +16079,8 @@ def index_apache_arrow_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -16536,7 +16134,6 @@ def index_apache_arrow_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -16581,7 +16178,6 @@ def _index_apache_arrow_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -16682,10 +16278,6 @@ def _index_apache_arrow_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -16767,8 +16359,7 @@ def index_apache_camel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16826,10 +16417,8 @@ def index_apache_camel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -16883,7 +16472,6 @@ def index_apache_camel_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -16932,8 +16520,7 @@ def index_apache_camel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -16991,10 +16578,8 @@ def index_apache_camel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17048,7 +16633,6 @@ def index_apache_camel_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17097,8 +16681,7 @@ def index_apache_camel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -17156,10 +16739,8 @@ def index_apache_camel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17213,7 +16794,6 @@ def index_apache_camel_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17258,7 +16838,6 @@ def _index_apache_camel_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -17359,10 +16938,6 @@ def _index_apache_camel_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -17444,8 +17019,7 @@ def index_apache_commons_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -17503,10 +17077,8 @@ def index_apache_commons_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17560,7 +17132,6 @@ def index_apache_commons_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17609,8 +17180,7 @@ def index_apache_commons_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -17668,10 +17238,8 @@ def index_apache_commons_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17725,7 +17293,6 @@ def index_apache_commons_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17774,8 +17341,7 @@ def index_apache_commons_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -17833,10 +17399,8 @@ def index_apache_commons_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -17890,7 +17454,6 @@ def index_apache_commons_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -17935,7 +17498,6 @@ def _index_apache_commons_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -18036,10 +17598,6 @@ def _index_apache_commons_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -18121,8 +17679,7 @@ def index_apache_couchdb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18180,10 +17737,8 @@ def index_apache_couchdb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -18237,7 +17792,6 @@ def index_apache_couchdb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -18286,8 +17840,7 @@ def index_apache_couchdb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18345,10 +17898,8 @@ def index_apache_couchdb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -18402,7 +17953,6 @@ def index_apache_couchdb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -18451,8 +18001,7 @@ def index_apache_couchdb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18510,10 +18059,8 @@ def index_apache_couchdb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -18567,7 +18114,6 @@ def index_apache_couchdb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -18612,7 +18158,6 @@ def _index_apache_couchdb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -18713,10 +18258,6 @@ def _index_apache_couchdb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -18798,8 +18339,7 @@ def index_apache_flink_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -18857,10 +18397,8 @@ def index_apache_flink_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -18914,7 +18452,6 @@ def index_apache_flink_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -18963,8 +18500,7 @@ def index_apache_flink_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19022,10 +18558,8 @@ def index_apache_flink_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19079,7 +18613,6 @@ def index_apache_flink_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19128,8 +18661,7 @@ def index_apache_flink_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19187,10 +18719,8 @@ def index_apache_flink_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19244,7 +18774,6 @@ def index_apache_flink_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19289,7 +18818,6 @@ def _index_apache_flink_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -19390,10 +18918,6 @@ def _index_apache_flink_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -19475,8 +18999,7 @@ def index_apache_guacamole_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19534,10 +19057,8 @@ def index_apache_guacamole_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19591,7 +19112,6 @@ def index_apache_guacamole_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19640,8 +19160,7 @@ def index_apache_guacamole_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19699,10 +19218,8 @@ def index_apache_guacamole_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19756,7 +19273,6 @@ def index_apache_guacamole_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19805,8 +19321,7 @@ def index_apache_guacamole_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -19864,10 +19379,8 @@ def index_apache_guacamole_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -19921,7 +19434,6 @@ def index_apache_guacamole_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -19966,7 +19478,6 @@ def _index_apache_guacamole_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -20067,10 +19578,6 @@ def _index_apache_guacamole_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -20152,8 +19659,7 @@ def index_apache_hadoop_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -20211,10 +19717,8 @@ def index_apache_hadoop_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -20268,7 +19772,6 @@ def index_apache_hadoop_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -20317,8 +19820,7 @@ def index_apache_hadoop_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -20376,10 +19878,8 @@ def index_apache_hadoop_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -20433,7 +19933,6 @@ def index_apache_hadoop_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -20482,8 +19981,7 @@ def index_apache_hadoop_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -20541,10 +20039,8 @@ def index_apache_hadoop_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -20598,7 +20094,6 @@ def index_apache_hadoop_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -20643,7 +20138,6 @@ def _index_apache_hadoop_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -20744,10 +20238,6 @@ def _index_apache_hadoop_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -20829,8 +20319,7 @@ def index_apache_http_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -20888,10 +20377,8 @@ def index_apache_http_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -20945,7 +20432,6 @@ def index_apache_http_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -20994,8 +20480,7 @@ def index_apache_http_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21053,10 +20538,8 @@ def index_apache_http_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21110,7 +20593,6 @@ def index_apache_http_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21159,8 +20641,7 @@ def index_apache_http_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21218,10 +20699,8 @@ def index_apache_http_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21275,7 +20754,6 @@ def index_apache_http_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21320,7 +20798,6 @@ def _index_apache_http_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -21421,10 +20898,6 @@ def _index_apache_http_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -21506,8 +20979,7 @@ def index_apache_jspwiki_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21565,10 +21037,8 @@ def index_apache_jspwiki_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21622,7 +21092,6 @@ def index_apache_jspwiki_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21671,8 +21140,7 @@ def index_apache_jspwiki_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21730,10 +21198,8 @@ def index_apache_jspwiki_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21787,7 +21253,6 @@ def index_apache_jspwiki_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21836,8 +21301,7 @@ def index_apache_jspwiki_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -21895,10 +21359,8 @@ def index_apache_jspwiki_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -21952,7 +21414,6 @@ def index_apache_jspwiki_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -21997,7 +21458,6 @@ def _index_apache_jspwiki_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -22098,10 +21558,6 @@ def _index_apache_jspwiki_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -22183,8 +21639,7 @@ def index_apache_kafka_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -22242,10 +21697,8 @@ def index_apache_kafka_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -22299,7 +21752,6 @@ def index_apache_kafka_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -22348,8 +21800,7 @@ def index_apache_kafka_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -22407,10 +21858,8 @@ def index_apache_kafka_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -22464,7 +21913,6 @@ def index_apache_kafka_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -22513,8 +21961,7 @@ def index_apache_kafka_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -22572,10 +22019,8 @@ def index_apache_kafka_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -22629,7 +22074,6 @@ def index_apache_kafka_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -22674,7 +22118,6 @@ def _index_apache_kafka_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -22775,10 +22218,6 @@ def _index_apache_kafka_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -22860,8 +22299,7 @@ def index_apache_loggingservices_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -22919,10 +22357,8 @@ def index_apache_loggingservices_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -22976,7 +22412,6 @@ def index_apache_loggingservices_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23025,8 +22460,7 @@ def index_apache_loggingservices_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23084,10 +22518,8 @@ def index_apache_loggingservices_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23141,7 +22573,6 @@ def index_apache_loggingservices_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23190,8 +22621,7 @@ def index_apache_loggingservices_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23249,10 +22679,8 @@ def index_apache_loggingservices_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23306,7 +22734,6 @@ def index_apache_loggingservices_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23351,7 +22778,6 @@ def _index_apache_loggingservices_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -23452,10 +22878,6 @@ def _index_apache_loggingservices_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -23537,8 +22959,7 @@ def index_apache_nifi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23596,10 +23017,8 @@ def index_apache_nifi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23653,7 +23072,6 @@ def index_apache_nifi_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23702,8 +23120,7 @@ def index_apache_nifi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23761,10 +23178,8 @@ def index_apache_nifi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23818,7 +23233,6 @@ def index_apache_nifi_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -23867,8 +23281,7 @@ def index_apache_nifi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -23926,10 +23339,8 @@ def index_apache_nifi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -23983,7 +23394,6 @@ def index_apache_nifi_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -24028,7 +23438,6 @@ def _index_apache_nifi_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -24129,10 +23538,6 @@ def _index_apache_nifi_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -24214,8 +23619,7 @@ def index_apache_ofbiz_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -24273,10 +23677,8 @@ def index_apache_ofbiz_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -24330,7 +23732,6 @@ def index_apache_ofbiz_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -24379,8 +23780,7 @@ def index_apache_ofbiz_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -24438,10 +23838,8 @@ def index_apache_ofbiz_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -24495,7 +23893,6 @@ def index_apache_ofbiz_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -24544,8 +23941,7 @@ def index_apache_ofbiz_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -24603,10 +23999,8 @@ def index_apache_ofbiz_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -24660,7 +24054,6 @@ def index_apache_ofbiz_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -24705,7 +24098,6 @@ def _index_apache_ofbiz_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -24806,10 +24198,6 @@ def _index_apache_ofbiz_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -24891,8 +24279,7 @@ def index_apache_openmeetings_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -24950,10 +24337,8 @@ def index_apache_openmeetings_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25007,7 +24392,6 @@ def index_apache_openmeetings_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25056,8 +24440,7 @@ def index_apache_openmeetings_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25115,10 +24498,8 @@ def index_apache_openmeetings_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25172,7 +24553,6 @@ def index_apache_openmeetings_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25221,8 +24601,7 @@ def index_apache_openmeetings_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25280,10 +24659,8 @@ def index_apache_openmeetings_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25337,7 +24714,6 @@ def index_apache_openmeetings_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25382,7 +24758,6 @@ def _index_apache_openmeetings_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -25483,10 +24858,6 @@ def _index_apache_openmeetings_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -25568,8 +24939,7 @@ def index_apache_openoffice_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25627,10 +24997,8 @@ def index_apache_openoffice_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25684,7 +25052,6 @@ def index_apache_openoffice_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25733,8 +25100,7 @@ def index_apache_openoffice_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25792,10 +25158,8 @@ def index_apache_openoffice_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -25849,7 +25213,6 @@ def index_apache_openoffice_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -25898,8 +25261,7 @@ def index_apache_openoffice_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -25957,10 +25319,8 @@ def index_apache_openoffice_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -26014,7 +25374,6 @@ def index_apache_openoffice_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -26059,7 +25418,6 @@ def _index_apache_openoffice_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -26160,10 +25518,6 @@ def _index_apache_openoffice_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -26245,8 +25599,7 @@ def index_apache_pulsar_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -26304,10 +25657,8 @@ def index_apache_pulsar_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -26361,7 +25712,6 @@ def index_apache_pulsar_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -26410,8 +25760,7 @@ def index_apache_pulsar_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -26469,10 +25818,8 @@ def index_apache_pulsar_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -26526,7 +25873,6 @@ def index_apache_pulsar_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -26575,8 +25921,7 @@ def index_apache_pulsar_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -26634,10 +25979,8 @@ def index_apache_pulsar_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -26691,7 +26034,6 @@ def index_apache_pulsar_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -26736,7 +26078,6 @@ def _index_apache_pulsar_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -26837,10 +26178,6 @@ def _index_apache_pulsar_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -26922,8 +26259,7 @@ def index_apache_shiro_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -26981,10 +26317,8 @@ def index_apache_shiro_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27038,7 +26372,6 @@ def index_apache_shiro_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27087,8 +26420,7 @@ def index_apache_shiro_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27146,10 +26478,8 @@ def index_apache_shiro_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27203,7 +26533,6 @@ def index_apache_shiro_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27252,8 +26581,7 @@ def index_apache_shiro_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27311,10 +26639,8 @@ def index_apache_shiro_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27368,7 +26694,6 @@ def index_apache_shiro_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27413,7 +26738,6 @@ def _index_apache_shiro_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -27514,10 +26838,6 @@ def _index_apache_shiro_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -27599,8 +26919,7 @@ def index_apache_spark_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27658,10 +26977,8 @@ def index_apache_spark_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27715,7 +27032,6 @@ def index_apache_spark_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27764,8 +27080,7 @@ def index_apache_spark_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27823,10 +27138,8 @@ def index_apache_spark_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -27880,7 +27193,6 @@ def index_apache_spark_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -27929,8 +27241,7 @@ def index_apache_spark_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -27988,10 +27299,8 @@ def index_apache_spark_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -28045,7 +27354,6 @@ def index_apache_spark_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -28090,7 +27398,6 @@ def _index_apache_spark_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -28191,10 +27498,6 @@ def _index_apache_spark_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -28276,8 +27579,7 @@ def index_apache_struts_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -28335,10 +27637,8 @@ def index_apache_struts_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -28392,7 +27692,6 @@ def index_apache_struts_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -28441,8 +27740,7 @@ def index_apache_struts_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -28500,10 +27798,8 @@ def index_apache_struts_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -28557,7 +27853,6 @@ def index_apache_struts_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -28606,8 +27901,7 @@ def index_apache_struts_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -28665,10 +27959,8 @@ def index_apache_struts_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -28722,7 +28014,6 @@ def index_apache_struts_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -28767,7 +28058,6 @@ def _index_apache_struts_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -28868,10 +28158,6 @@ def _index_apache_struts_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -28953,8 +28239,7 @@ def index_apache_subversion_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29012,10 +28297,8 @@ def index_apache_subversion_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29069,7 +28352,6 @@ def index_apache_subversion_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29118,8 +28400,7 @@ def index_apache_subversion_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29177,10 +28458,8 @@ def index_apache_subversion_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29234,7 +28513,6 @@ def index_apache_subversion_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29283,8 +28561,7 @@ def index_apache_subversion_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29342,10 +28619,8 @@ def index_apache_subversion_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29399,7 +28674,6 @@ def index_apache_subversion_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29444,7 +28718,6 @@ def _index_apache_subversion_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -29545,10 +28818,6 @@ def _index_apache_subversion_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -29630,8 +28899,7 @@ def index_apache_superset_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29689,10 +28957,8 @@ def index_apache_superset_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29746,7 +29012,6 @@ def index_apache_superset_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29795,8 +29060,7 @@ def index_apache_superset_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -29854,10 +29118,8 @@ def index_apache_superset_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -29911,7 +29173,6 @@ def index_apache_superset_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -29960,8 +29221,7 @@ def index_apache_superset_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -30019,10 +29279,8 @@ def index_apache_superset_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -30076,7 +29334,6 @@ def index_apache_superset_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -30121,7 +29378,6 @@ def _index_apache_superset_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -30222,10 +29478,6 @@ def _index_apache_superset_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -30307,8 +29559,7 @@ def index_apache_tomcat_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -30366,10 +29617,8 @@ def index_apache_tomcat_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -30423,7 +29672,6 @@ def index_apache_tomcat_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -30472,8 +29720,7 @@ def index_apache_tomcat_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -30531,10 +29778,8 @@ def index_apache_tomcat_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -30588,7 +29833,6 @@ def index_apache_tomcat_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -30637,8 +29881,7 @@ def index_apache_tomcat_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -30696,10 +29939,8 @@ def index_apache_tomcat_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -30753,7 +29994,6 @@ def index_apache_tomcat_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -30798,7 +30038,6 @@ def _index_apache_tomcat_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -30899,10 +30138,6 @@ def _index_apache_tomcat_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -30984,8 +30219,7 @@ def index_apache_zookeeper_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31043,10 +30277,8 @@ def index_apache_zookeeper_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31100,7 +30332,6 @@ def index_apache_zookeeper_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31149,8 +30380,7 @@ def index_apache_zookeeper_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31208,10 +30438,8 @@ def index_apache_zookeeper_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31265,7 +30493,6 @@ def index_apache_zookeeper_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31314,8 +30541,7 @@ def index_apache_zookeeper_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31373,10 +30599,8 @@ def index_apache_zookeeper_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31430,7 +30654,6 @@ def index_apache_zookeeper_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31475,7 +30698,6 @@ def _index_apache_zookeeper_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -31576,10 +30798,6 @@ def _index_apache_zookeeper_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -31661,8 +30879,7 @@ def index_appcheck_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31720,10 +30937,8 @@ def index_appcheck_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31777,7 +30992,6 @@ def index_appcheck_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31826,8 +31040,7 @@ def index_appcheck_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -31885,10 +31098,8 @@ def index_appcheck_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -31942,7 +31153,6 @@ def index_appcheck_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -31991,8 +31201,7 @@ def index_appcheck_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -32050,10 +31259,8 @@ def index_appcheck_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -32107,7 +31314,6 @@ def index_appcheck_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -32152,7 +31358,6 @@ def _index_appcheck_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -32253,10 +31458,6 @@ def _index_appcheck_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -32338,8 +31539,7 @@ def index_appgate_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -32397,10 +31597,8 @@ def index_appgate_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -32454,7 +31652,6 @@ def index_appgate_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -32503,8 +31700,7 @@ def index_appgate_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -32562,10 +31758,8 @@ def index_appgate_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -32619,7 +31813,6 @@ def index_appgate_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -32668,8 +31861,7 @@ def index_appgate_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -32727,10 +31919,8 @@ def index_appgate_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -32784,7 +31974,6 @@ def index_appgate_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -32829,7 +32018,6 @@ def _index_appgate_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -32930,10 +32118,6 @@ def _index_appgate_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -33015,8 +32199,7 @@ def index_apple_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33074,10 +32257,8 @@ def index_apple_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33131,7 +32312,6 @@ def index_apple_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -33180,8 +32360,7 @@ def index_apple_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33239,10 +32418,8 @@ def index_apple_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33296,7 +32473,6 @@ def index_apple_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -33345,8 +32521,7 @@ def index_apple_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33404,10 +32579,8 @@ def index_apple_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33461,7 +32634,6 @@ def index_apple_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -33506,7 +32678,6 @@ def _index_apple_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -33607,10 +32778,6 @@ def _index_apple_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -33692,8 +32859,7 @@ def index_arch_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33751,10 +32917,8 @@ def index_arch_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33808,7 +32972,6 @@ def index_arch_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -33857,8 +33020,7 @@ def index_arch_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -33916,10 +33078,8 @@ def index_arch_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -33973,7 +33133,6 @@ def index_arch_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34022,8 +33181,7 @@ def index_arch_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -34081,10 +33239,8 @@ def index_arch_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -34138,7 +33294,6 @@ def index_arch_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34183,7 +33338,6 @@ def _index_arch_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -34284,10 +33438,6 @@ def _index_arch_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -34369,8 +33519,7 @@ def index_arista_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -34428,10 +33577,8 @@ def index_arista_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -34485,7 +33632,6 @@ def index_arista_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34534,8 +33680,7 @@ def index_arista_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -34593,10 +33738,8 @@ def index_arista_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -34650,7 +33793,6 @@ def index_arista_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34699,8 +33841,7 @@ def index_arista_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -34758,10 +33899,8 @@ def index_arista_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -34815,7 +33954,6 @@ def index_arista_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -34860,7 +33998,6 @@ def _index_arista_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -34961,10 +34098,6 @@ def _index_arista_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -35046,8 +34179,7 @@ def index_aruba_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35105,10 +34237,8 @@ def index_aruba_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -35162,7 +34292,6 @@ def index_aruba_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -35211,8 +34340,7 @@ def index_aruba_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35270,10 +34398,8 @@ def index_aruba_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -35327,7 +34453,6 @@ def index_aruba_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -35376,8 +34501,7 @@ def index_aruba_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35435,10 +34559,8 @@ def index_aruba_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -35492,7 +34614,6 @@ def index_aruba_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -35537,7 +34658,6 @@ def _index_aruba_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -35638,10 +34758,6 @@ def _index_aruba_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -35723,8 +34839,7 @@ def index_asrg_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35782,10 +34897,8 @@ def index_asrg_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -35839,7 +34952,6 @@ def index_asrg_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -35888,8 +35000,7 @@ def index_asrg_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -35947,10 +35058,8 @@ def index_asrg_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36004,7 +35113,6 @@ def index_asrg_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36053,8 +35161,7 @@ def index_asrg_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -36112,10 +35219,8 @@ def index_asrg_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36169,7 +35274,6 @@ def index_asrg_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36214,7 +35318,6 @@ def _index_asrg_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -36315,10 +35418,6 @@ def _index_asrg_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -36400,8 +35499,7 @@ def index_assetnote_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -36459,10 +35557,8 @@ def index_assetnote_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36516,7 +35612,6 @@ def index_assetnote_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36565,8 +35660,7 @@ def index_assetnote_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -36624,10 +35718,8 @@ def index_assetnote_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36681,7 +35773,6 @@ def index_assetnote_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36730,8 +35821,7 @@ def index_assetnote_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -36789,10 +35879,8 @@ def index_assetnote_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -36846,7 +35934,6 @@ def index_assetnote_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -36891,7 +35978,6 @@ def _index_assetnote_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -36992,10 +36078,6 @@ def _index_assetnote_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -37077,8 +36159,7 @@ def index_asterisk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37136,10 +36217,8 @@ def index_asterisk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -37193,7 +36272,6 @@ def index_asterisk_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -37242,8 +36320,7 @@ def index_asterisk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37301,10 +36378,8 @@ def index_asterisk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -37358,7 +36433,6 @@ def index_asterisk_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -37407,8 +36481,7 @@ def index_asterisk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37466,10 +36539,8 @@ def index_asterisk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -37523,7 +36594,6 @@ def index_asterisk_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -37568,7 +36638,6 @@ def _index_asterisk_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -37669,10 +36738,6 @@ def _index_asterisk_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -37754,8 +36819,7 @@ def index_astra_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37813,10 +36877,8 @@ def index_astra_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -37870,7 +36932,6 @@ def index_astra_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -37919,8 +36980,7 @@ def index_astra_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -37978,10 +37038,8 @@ def index_astra_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38035,7 +37093,6 @@ def index_astra_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38084,8 +37141,7 @@ def index_astra_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -38143,10 +37199,8 @@ def index_astra_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38200,7 +37254,6 @@ def index_astra_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38245,7 +37298,6 @@ def _index_astra_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -38346,10 +37398,6 @@ def _index_astra_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -38431,8 +37479,7 @@ def index_asus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -38490,10 +37537,8 @@ def index_asus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38547,7 +37592,6 @@ def index_asus_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38596,8 +37640,7 @@ def index_asus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -38655,10 +37698,8 @@ def index_asus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38712,7 +37753,6 @@ def index_asus_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38761,8 +37801,7 @@ def index_asus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -38820,10 +37859,8 @@ def index_asus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -38877,7 +37914,6 @@ def index_asus_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -38922,7 +37958,6 @@ def _index_asus_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -39023,10 +38058,6 @@ def _index_asus_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -39108,8 +38139,7 @@ def index_atlassian_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39167,10 +38197,8 @@ def index_atlassian_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -39224,7 +38252,6 @@ def index_atlassian_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -39273,8 +38300,7 @@ def index_atlassian_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39332,10 +38358,8 @@ def index_atlassian_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -39389,7 +38413,6 @@ def index_atlassian_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -39438,8 +38461,7 @@ def index_atlassian_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39497,10 +38519,8 @@ def index_atlassian_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -39554,7 +38574,6 @@ def index_atlassian_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -39599,7 +38618,6 @@ def _index_atlassian_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -39700,10 +38718,6 @@ def _index_atlassian_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -39785,8 +38799,7 @@ def index_atlassian_vulns_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -39844,10 +38857,8 @@ def index_atlassian_vulns_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -39901,7 +38912,6 @@ def index_atlassian_vulns_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -39950,8 +38960,7 @@ def index_atlassian_vulns_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40009,10 +39018,8 @@ def index_atlassian_vulns_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40066,7 +39073,6 @@ def index_atlassian_vulns_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40115,8 +39121,7 @@ def index_atlassian_vulns_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40174,10 +39179,8 @@ def index_atlassian_vulns_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40231,7 +39234,6 @@ def index_atlassian_vulns_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40276,7 +39278,6 @@ def _index_atlassian_vulns_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -40377,10 +39378,6 @@ def _index_atlassian_vulns_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -40462,8 +39459,7 @@ def index_atredis_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40521,10 +39517,8 @@ def index_atredis_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40578,7 +39572,6 @@ def index_atredis_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40627,8 +39620,7 @@ def index_atredis_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40686,10 +39678,8 @@ def index_atredis_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40743,7 +39733,6 @@ def index_atredis_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40792,8 +39781,7 @@ def index_atredis_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -40851,10 +39839,8 @@ def index_atredis_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -40908,7 +39894,6 @@ def index_atredis_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -40953,7 +39938,6 @@ def _index_atredis_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -41054,10 +40038,6 @@ def _index_atredis_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -41139,8 +40119,7 @@ def index_audiocodes_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -41198,10 +40177,8 @@ def index_audiocodes_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -41255,7 +40232,6 @@ def index_audiocodes_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -41304,8 +40280,7 @@ def index_audiocodes_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -41363,10 +40338,8 @@ def index_audiocodes_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -41420,7 +40393,6 @@ def index_audiocodes_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -41469,8 +40441,7 @@ def index_audiocodes_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -41528,10 +40499,8 @@ def index_audiocodes_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -41585,7 +40554,6 @@ def index_audiocodes_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -41630,7 +40598,6 @@ def _index_audiocodes_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -41731,10 +40698,6 @@ def _index_audiocodes_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -41816,8 +40779,7 @@ def index_auscert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -41875,10 +40837,8 @@ def index_auscert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -41932,7 +40892,6 @@ def index_auscert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -41981,8 +40940,7 @@ def index_auscert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42040,10 +40998,8 @@ def index_auscert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42097,7 +41053,6 @@ def index_auscert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42146,8 +41101,7 @@ def index_auscert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42205,10 +41159,8 @@ def index_auscert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42262,7 +41214,6 @@ def index_auscert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42307,7 +41258,6 @@ def _index_auscert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -42408,10 +41358,6 @@ def _index_auscert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -42493,8 +41439,7 @@ def index_autodesk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42552,10 +41497,8 @@ def index_autodesk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42609,7 +41552,6 @@ def index_autodesk_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42658,8 +41600,7 @@ def index_autodesk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42717,10 +41658,8 @@ def index_autodesk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42774,7 +41713,6 @@ def index_autodesk_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42823,8 +41761,7 @@ def index_autodesk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -42882,10 +41819,8 @@ def index_autodesk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -42939,7 +41874,6 @@ def index_autodesk_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -42984,7 +41918,6 @@ def _index_autodesk_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -43085,10 +42018,6 @@ def _index_autodesk_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -43170,8 +42099,7 @@ def index_avaya_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -43229,10 +42157,8 @@ def index_avaya_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -43286,7 +42212,6 @@ def index_avaya_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -43335,8 +42260,7 @@ def index_avaya_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -43394,10 +42318,8 @@ def index_avaya_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -43451,7 +42373,6 @@ def index_avaya_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -43500,8 +42421,7 @@ def index_avaya_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -43559,10 +42479,8 @@ def index_avaya_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -43616,7 +42534,6 @@ def index_avaya_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -43661,7 +42578,6 @@ def _index_avaya_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -43762,10 +42678,6 @@ def _index_avaya_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -43847,8 +42759,7 @@ def index_aveva_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -43906,10 +42817,8 @@ def index_aveva_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -43963,7 +42872,6 @@ def index_aveva_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44012,8 +42920,7 @@ def index_aveva_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44071,10 +42978,8 @@ def index_aveva_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44128,7 +43033,6 @@ def index_aveva_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44177,8 +43081,7 @@ def index_aveva_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44236,10 +43139,8 @@ def index_aveva_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44293,7 +43194,6 @@ def index_aveva_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44338,7 +43238,6 @@ def _index_aveva_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -44439,10 +43338,6 @@ def _index_aveva_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -44524,8 +43419,7 @@ def index_avidml_advs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44583,10 +43477,8 @@ def index_avidml_advs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44640,7 +43532,6 @@ def index_avidml_advs_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44689,8 +43580,7 @@ def index_avidml_advs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44748,10 +43638,8 @@ def index_avidml_advs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44805,7 +43693,6 @@ def index_avidml_advs_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -44854,8 +43741,7 @@ def index_avidml_advs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -44913,10 +43799,8 @@ def index_avidml_advs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -44970,7 +43854,6 @@ def index_avidml_advs_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -45015,7 +43898,6 @@ def _index_avidml_advs_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -45116,10 +43998,6 @@ def _index_avidml_advs_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -45201,8 +44079,7 @@ def index_avigilon_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -45260,10 +44137,8 @@ def index_avigilon_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -45317,7 +44192,6 @@ def index_avigilon_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -45366,8 +44240,7 @@ def index_avigilon_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -45425,10 +44298,8 @@ def index_avigilon_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -45482,7 +44353,6 @@ def index_avigilon_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -45531,8 +44401,7 @@ def index_avigilon_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -45590,10 +44459,8 @@ def index_avigilon_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -45647,7 +44514,6 @@ def index_avigilon_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -45692,7 +44558,6 @@ def _index_avigilon_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -45793,10 +44658,6 @@ def _index_avigilon_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -45878,8 +44739,7 @@ def index_aws_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -45937,10 +44797,8 @@ def index_aws_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -45994,7 +44852,6 @@ def index_aws_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46043,8 +44900,7 @@ def index_aws_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46102,10 +44958,8 @@ def index_aws_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -46159,7 +45013,6 @@ def index_aws_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46208,8 +45061,7 @@ def index_aws_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46267,10 +45119,8 @@ def index_aws_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -46324,7 +45174,6 @@ def index_aws_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46369,7 +45218,6 @@ def _index_aws_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -46470,10 +45318,6 @@ def _index_aws_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -46555,8 +45399,7 @@ def index_axis_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46614,10 +45457,8 @@ def index_axis_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -46671,7 +45512,6 @@ def index_axis_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46720,8 +45560,7 @@ def index_axis_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46779,10 +45618,8 @@ def index_axis_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -46836,7 +45673,6 @@ def index_axis_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -46885,8 +45721,7 @@ def index_axis_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -46944,10 +45779,8 @@ def index_axis_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -47001,7 +45834,6 @@ def index_axis_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -47046,7 +45878,6 @@ def _index_axis_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -47147,10 +45978,6 @@ def _index_axis_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -47232,8 +46059,7 @@ def index_azul_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -47291,10 +46117,8 @@ def index_azul_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -47348,7 +46172,6 @@ def index_azul_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -47397,8 +46220,7 @@ def index_azul_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -47456,10 +46278,8 @@ def index_azul_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -47513,7 +46333,6 @@ def index_azul_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -47562,8 +46381,7 @@ def index_azul_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -47621,10 +46439,8 @@ def index_azul_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -47678,7 +46494,6 @@ def index_azul_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -47723,7 +46538,6 @@ def _index_azul_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -47824,10 +46638,6 @@ def _index_azul_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -47909,8 +46719,7 @@ def index_bandr_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -47968,10 +46777,8 @@ def index_bandr_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48025,7 +46832,6 @@ def index_bandr_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48074,8 +46880,7 @@ def index_bandr_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48133,10 +46938,8 @@ def index_bandr_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48190,7 +46993,6 @@ def index_bandr_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48239,8 +47041,7 @@ def index_bandr_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48298,10 +47099,8 @@ def index_bandr_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48355,7 +47154,6 @@ def index_bandr_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48400,7 +47198,6 @@ def _index_bandr_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -48501,10 +47298,6 @@ def _index_bandr_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -48586,8 +47379,7 @@ def index_baxter_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48645,10 +47437,8 @@ def index_baxter_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48702,7 +47492,6 @@ def index_baxter_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48751,8 +47540,7 @@ def index_baxter_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48810,10 +47598,8 @@ def index_baxter_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -48867,7 +47653,6 @@ def index_baxter_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -48916,8 +47701,7 @@ def index_baxter_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -48975,10 +47759,8 @@ def index_baxter_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -49032,7 +47814,6 @@ def index_baxter_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -49077,7 +47858,6 @@ def _index_baxter_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -49178,10 +47958,6 @@ def _index_baxter_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -49263,8 +48039,7 @@ def index_bbraun_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -49322,10 +48097,8 @@ def index_bbraun_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -49379,7 +48152,6 @@ def index_bbraun_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -49428,8 +48200,7 @@ def index_bbraun_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -49487,10 +48258,8 @@ def index_bbraun_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -49544,7 +48313,6 @@ def index_bbraun_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -49593,8 +48361,7 @@ def index_bbraun_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -49652,10 +48419,8 @@ def index_bbraun_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -49709,7 +48474,6 @@ def index_bbraun_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -49754,7 +48518,6 @@ def _index_bbraun_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -49855,10 +48618,6 @@ def _index_bbraun_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -49940,8 +48699,7 @@ def index_bd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -49999,10 +48757,8 @@ def index_bd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50056,7 +48812,6 @@ def index_bd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50105,8 +48860,7 @@ def index_bd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50164,10 +48918,8 @@ def index_bd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50221,7 +48973,6 @@ def index_bd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50270,8 +49021,7 @@ def index_bd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50329,10 +49079,8 @@ def index_bd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50386,7 +49134,6 @@ def index_bd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50431,7 +49178,6 @@ def _index_bd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -50532,10 +49278,6 @@ def _index_bd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -50617,8 +49359,7 @@ def index_bdu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50676,10 +49417,8 @@ def index_bdu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50733,7 +49472,6 @@ def index_bdu_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50782,8 +49520,7 @@ def index_bdu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -50841,10 +49578,8 @@ def index_bdu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -50898,7 +49633,6 @@ def index_bdu_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -50947,8 +49681,7 @@ def index_bdu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -51006,10 +49739,8 @@ def index_bdu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -51063,7 +49794,6 @@ def index_bdu_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -51108,7 +49838,6 @@ def _index_bdu_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -51209,10 +49938,6 @@ def _index_bdu_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -51294,8 +50019,7 @@ def index_beckhoff_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -51353,10 +50077,8 @@ def index_beckhoff_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -51410,7 +50132,6 @@ def index_beckhoff_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -51459,8 +50180,7 @@ def index_beckhoff_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -51518,10 +50238,8 @@ def index_beckhoff_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -51575,7 +50293,6 @@ def index_beckhoff_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -51624,8 +50341,7 @@ def index_beckhoff_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -51683,10 +50399,8 @@ def index_beckhoff_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -51740,7 +50454,6 @@ def index_beckhoff_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -51785,7 +50498,6 @@ def _index_beckhoff_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -51886,10 +50598,6 @@ def _index_beckhoff_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -51971,8 +50679,7 @@ def index_beckman_coulter_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52030,10 +50737,8 @@ def index_beckman_coulter_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52087,7 +50792,6 @@ def index_beckman_coulter_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52136,8 +50840,7 @@ def index_beckman_coulter_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52195,10 +50898,8 @@ def index_beckman_coulter_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52252,7 +50953,6 @@ def index_beckman_coulter_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52301,8 +51001,7 @@ def index_beckman_coulter_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52360,10 +51059,8 @@ def index_beckman_coulter_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52417,7 +51114,6 @@ def index_beckman_coulter_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52462,7 +51158,6 @@ def _index_beckman_coulter_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -52563,10 +51258,6 @@ def _index_beckman_coulter_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -52648,8 +51339,7 @@ def index_belden_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52707,10 +51397,8 @@ def index_belden_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52764,7 +51452,6 @@ def index_belden_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52813,8 +51500,7 @@ def index_belden_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -52872,10 +51558,8 @@ def index_belden_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -52929,7 +51613,6 @@ def index_belden_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -52978,8 +51661,7 @@ def index_belden_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -53037,10 +51719,8 @@ def index_belden_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -53094,7 +51774,6 @@ def index_belden_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -53139,7 +51818,6 @@ def _index_belden_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -53240,10 +51918,6 @@ def _index_belden_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -53325,8 +51999,7 @@ def index_beyond_trust_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -53384,10 +52057,8 @@ def index_beyond_trust_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -53441,7 +52112,6 @@ def index_beyond_trust_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -53490,8 +52160,7 @@ def index_beyond_trust_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -53549,10 +52218,8 @@ def index_beyond_trust_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -53606,7 +52273,6 @@ def index_beyond_trust_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -53655,8 +52321,7 @@ def index_beyond_trust_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -53714,10 +52379,8 @@ def index_beyond_trust_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -53771,7 +52434,6 @@ def index_beyond_trust_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -53816,7 +52478,6 @@ def _index_beyond_trust_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -53917,10 +52578,6 @@ def _index_beyond_trust_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -54002,8 +52659,7 @@ def index_binarly_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54061,10 +52717,8 @@ def index_binarly_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54118,7 +52772,6 @@ def index_binarly_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -54167,8 +52820,7 @@ def index_binarly_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54226,10 +52878,8 @@ def index_binarly_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54283,7 +52933,6 @@ def index_binarly_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -54332,8 +52981,7 @@ def index_binarly_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54391,10 +53039,8 @@ def index_binarly_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54448,7 +53094,6 @@ def index_binarly_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -54493,7 +53138,6 @@ def _index_binarly_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -54594,10 +53238,6 @@ def _index_binarly_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -54679,8 +53319,7 @@ def index_bitdefender_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54738,10 +53377,8 @@ def index_bitdefender_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54795,7 +53432,6 @@ def index_bitdefender_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -54844,8 +53480,7 @@ def index_bitdefender_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -54903,10 +53538,8 @@ def index_bitdefender_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -54960,7 +53593,6 @@ def index_bitdefender_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55009,8 +53641,7 @@ def index_bitdefender_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -55068,10 +53699,8 @@ def index_bitdefender_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -55125,7 +53754,6 @@ def index_bitdefender_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55170,7 +53798,6 @@ def _index_bitdefender_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -55271,10 +53898,6 @@ def _index_bitdefender_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -55356,8 +53979,7 @@ def index_blackberry_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -55415,10 +54037,8 @@ def index_blackberry_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -55472,7 +54092,6 @@ def index_blackberry_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55521,8 +54140,7 @@ def index_blackberry_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -55580,10 +54198,8 @@ def index_blackberry_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -55637,7 +54253,6 @@ def index_blackberry_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55686,8 +54301,7 @@ def index_blackberry_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -55745,10 +54359,8 @@ def index_blackberry_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -55802,7 +54414,6 @@ def index_blackberry_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -55847,7 +54458,6 @@ def _index_blackberry_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -55948,10 +54558,6 @@ def _index_blackberry_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -56033,8 +54639,7 @@ def index_bls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56092,10 +54697,8 @@ def index_bls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56149,7 +54752,6 @@ def index_bls_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -56198,8 +54800,7 @@ def index_bls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56257,10 +54858,8 @@ def index_bls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56314,7 +54913,6 @@ def index_bls_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -56363,8 +54961,7 @@ def index_bls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56422,10 +55019,8 @@ def index_bls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56479,7 +55074,6 @@ def index_bls_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -56524,7 +55118,6 @@ def _index_bls_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -56625,10 +55218,6 @@ def _index_bls_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -56710,8 +55299,7 @@ def index_bosch_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56769,10 +55357,8 @@ def index_bosch_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56826,7 +55412,6 @@ def index_bosch_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -56875,8 +55460,7 @@ def index_bosch_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -56934,10 +55518,8 @@ def index_bosch_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -56991,7 +55573,6 @@ def index_bosch_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57040,8 +55621,7 @@ def index_bosch_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -57099,10 +55679,8 @@ def index_bosch_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -57156,7 +55734,6 @@ def index_bosch_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57201,7 +55778,6 @@ def _index_bosch_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -57302,10 +55878,6 @@ def _index_bosch_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -57387,8 +55959,7 @@ def index_boston_scientific_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -57446,10 +56017,8 @@ def index_boston_scientific_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -57503,7 +56072,6 @@ def index_boston_scientific_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57552,8 +56120,7 @@ def index_boston_scientific_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -57611,10 +56178,8 @@ def index_boston_scientific_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -57668,7 +56233,6 @@ def index_boston_scientific_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57717,8 +56281,7 @@ def index_boston_scientific_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -57776,10 +56339,8 @@ def index_boston_scientific_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -57833,7 +56394,6 @@ def index_boston_scientific_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -57878,7 +56438,6 @@ def _index_boston_scientific_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -57979,10 +56538,6 @@ def _index_boston_scientific_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -58064,8 +56619,7 @@ def index_botnets_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58123,10 +56677,8 @@ def index_botnets_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -58180,7 +56732,6 @@ def index_botnets_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -58229,8 +56780,7 @@ def index_botnets_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58288,10 +56838,8 @@ def index_botnets_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -58345,7 +56893,6 @@ def index_botnets_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -58394,8 +56941,7 @@ def index_botnets_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58453,10 +56999,8 @@ def index_botnets_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -58510,7 +57054,6 @@ def index_botnets_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -58555,7 +57098,6 @@ def _index_botnets_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -58656,10 +57198,6 @@ def _index_botnets_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -58741,8 +57279,7 @@ def index_ca_cyber_centre_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58800,10 +57337,8 @@ def index_ca_cyber_centre_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -58857,7 +57392,6 @@ def index_ca_cyber_centre_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -58906,8 +57440,7 @@ def index_ca_cyber_centre_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -58965,10 +57498,8 @@ def index_ca_cyber_centre_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59022,7 +57553,6 @@ def index_ca_cyber_centre_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59071,8 +57601,7 @@ def index_ca_cyber_centre_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -59130,10 +57659,8 @@ def index_ca_cyber_centre_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59187,7 +57714,6 @@ def index_ca_cyber_centre_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59232,7 +57758,6 @@ def _index_ca_cyber_centre_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -59333,10 +57858,6 @@ def _index_ca_cyber_centre_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -59418,8 +57939,7 @@ def index_canvas_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -59477,10 +57997,8 @@ def index_canvas_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59534,7 +58052,6 @@ def index_canvas_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59583,8 +58100,7 @@ def index_canvas_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -59642,10 +58158,8 @@ def index_canvas_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59699,7 +58213,6 @@ def index_canvas_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59748,8 +58261,7 @@ def index_canvas_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -59807,10 +58319,8 @@ def index_canvas_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -59864,7 +58374,6 @@ def index_canvas_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -59909,7 +58418,6 @@ def _index_canvas_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -60010,10 +58518,6 @@ def _index_canvas_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -60095,8 +58599,7 @@ def index_carestream_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60154,10 +58657,8 @@ def index_carestream_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -60211,7 +58712,6 @@ def index_carestream_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -60260,8 +58760,7 @@ def index_carestream_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60319,10 +58818,8 @@ def index_carestream_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -60376,7 +58873,6 @@ def index_carestream_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -60425,8 +58921,7 @@ def index_carestream_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60484,10 +58979,8 @@ def index_carestream_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -60541,7 +59034,6 @@ def index_carestream_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -60586,7 +59078,6 @@ def _index_carestream_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -60687,10 +59178,6 @@ def _index_carestream_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -60772,8 +59259,7 @@ def index_cargo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60831,10 +59317,8 @@ def index_cargo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -60888,7 +59372,6 @@ def index_cargo_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -60937,8 +59420,7 @@ def index_cargo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -60996,10 +59478,8 @@ def index_cargo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61053,7 +59533,6 @@ def index_cargo_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61102,8 +59581,7 @@ def index_cargo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -61161,10 +59639,8 @@ def index_cargo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61218,7 +59694,6 @@ def index_cargo_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61263,7 +59738,6 @@ def _index_cargo_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -61364,10 +59838,6 @@ def _index_cargo_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -61449,8 +59919,7 @@ def index_carrier_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -61508,10 +59977,8 @@ def index_carrier_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61565,7 +60032,6 @@ def index_carrier_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61614,8 +60080,7 @@ def index_carrier_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -61673,10 +60138,8 @@ def index_carrier_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61730,7 +60193,6 @@ def index_carrier_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61779,8 +60241,7 @@ def index_carrier_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -61838,10 +60299,8 @@ def index_carrier_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -61895,7 +60354,6 @@ def index_carrier_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -61940,7 +60398,6 @@ def _index_carrier_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -62041,10 +60498,6 @@ def _index_carrier_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -62126,8 +60579,7 @@ def index_cbl_mariner_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62185,10 +60637,8 @@ def index_cbl_mariner_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -62242,7 +60692,6 @@ def index_cbl_mariner_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -62291,8 +60740,7 @@ def index_cbl_mariner_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62350,10 +60798,8 @@ def index_cbl_mariner_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -62407,7 +60853,6 @@ def index_cbl_mariner_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -62456,8 +60901,7 @@ def index_cbl_mariner_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62515,10 +60959,8 @@ def index_cbl_mariner_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -62572,7 +61014,6 @@ def index_cbl_mariner_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -62617,7 +61058,6 @@ def _index_cbl_mariner_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -62718,10 +61158,6 @@ def _index_cbl_mariner_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -62803,8 +61239,7 @@ def index_centos_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -62862,10 +61297,8 @@ def index_centos_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -62919,7 +61352,6 @@ def index_centos_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -62968,8 +61400,7 @@ def index_centos_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63027,10 +61458,8 @@ def index_centos_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63084,7 +61513,6 @@ def index_centos_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63133,8 +61561,7 @@ def index_centos_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63192,10 +61619,8 @@ def index_centos_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63249,7 +61674,6 @@ def index_centos_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63294,7 +61718,6 @@ def _index_centos_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -63395,10 +61818,6 @@ def _index_centos_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -63480,8 +61899,7 @@ def index_cert_be_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63539,10 +61957,8 @@ def index_cert_be_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63596,7 +62012,6 @@ def index_cert_be_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63645,8 +62060,7 @@ def index_cert_be_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63704,10 +62118,8 @@ def index_cert_be_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63761,7 +62173,6 @@ def index_cert_be_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63810,8 +62221,7 @@ def index_cert_be_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -63869,10 +62279,8 @@ def index_cert_be_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -63926,7 +62334,6 @@ def index_cert_be_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -63971,7 +62378,6 @@ def _index_cert_be_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -64072,10 +62478,6 @@ def _index_cert_be_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -64157,8 +62559,7 @@ def index_cert_in_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -64216,10 +62617,8 @@ def index_cert_in_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -64273,7 +62672,6 @@ def index_cert_in_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -64322,8 +62720,7 @@ def index_cert_in_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -64381,10 +62778,8 @@ def index_cert_in_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -64438,7 +62833,6 @@ def index_cert_in_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -64487,8 +62881,7 @@ def index_cert_in_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -64546,10 +62939,8 @@ def index_cert_in_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -64603,7 +62994,6 @@ def index_cert_in_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -64648,7 +63038,6 @@ def _index_cert_in_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -64749,10 +63138,6 @@ def _index_cert_in_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -64834,8 +63219,7 @@ def index_cert_ir_security_alerts_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -64893,10 +63277,8 @@ def index_cert_ir_security_alerts_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -64950,7 +63332,6 @@ def index_cert_ir_security_alerts_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -64999,8 +63380,7 @@ def index_cert_ir_security_alerts_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65058,10 +63438,8 @@ def index_cert_ir_security_alerts_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65115,7 +63493,6 @@ def index_cert_ir_security_alerts_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -65164,8 +63541,7 @@ def index_cert_ir_security_alerts_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65223,10 +63599,8 @@ def index_cert_ir_security_alerts_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65280,7 +63654,6 @@ def index_cert_ir_security_alerts_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -65325,7 +63698,6 @@ def _index_cert_ir_security_alerts_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -65426,10 +63798,6 @@ def _index_cert_ir_security_alerts_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -65511,8 +63879,7 @@ def index_cert_se_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65570,10 +63937,8 @@ def index_cert_se_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65627,7 +63992,6 @@ def index_cert_se_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -65676,8 +64040,7 @@ def index_cert_se_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65735,10 +64098,8 @@ def index_cert_se_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65792,7 +64153,6 @@ def index_cert_se_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -65841,8 +64201,7 @@ def index_cert_se_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -65900,10 +64259,8 @@ def index_cert_se_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -65957,7 +64314,6 @@ def index_cert_se_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -66002,7 +64358,6 @@ def _index_cert_se_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -66103,10 +64458,6 @@ def _index_cert_se_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -66188,8 +64539,7 @@ def index_cert_ua_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -66247,10 +64597,8 @@ def index_cert_ua_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -66304,7 +64652,6 @@ def index_cert_ua_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -66353,8 +64700,7 @@ def index_cert_ua_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -66412,10 +64758,8 @@ def index_cert_ua_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -66469,7 +64813,6 @@ def index_cert_ua_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -66518,8 +64861,7 @@ def index_cert_ua_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -66577,10 +64919,8 @@ def index_cert_ua_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -66634,7 +64974,6 @@ def index_cert_ua_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -66679,7 +65018,6 @@ def _index_cert_ua_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -66780,10 +65118,6 @@ def _index_cert_ua_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -66865,8 +65199,7 @@ def index_certeu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -66924,10 +65257,8 @@ def index_certeu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -66981,7 +65312,6 @@ def index_certeu_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67030,8 +65360,7 @@ def index_certeu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67089,10 +65418,8 @@ def index_certeu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67146,7 +65473,6 @@ def index_certeu_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67195,8 +65521,7 @@ def index_certeu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67254,10 +65579,8 @@ def index_certeu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67311,7 +65634,6 @@ def index_certeu_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67356,7 +65678,6 @@ def _index_certeu_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -67457,10 +65778,6 @@ def _index_certeu_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -67542,8 +65859,7 @@ def index_certfr_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67601,10 +65917,8 @@ def index_certfr_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67658,7 +65972,6 @@ def index_certfr_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67707,8 +66020,7 @@ def index_certfr_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67766,10 +66078,8 @@ def index_certfr_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67823,7 +66133,6 @@ def index_certfr_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -67872,8 +66181,7 @@ def index_certfr_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -67931,10 +66239,8 @@ def index_certfr_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -67988,7 +66294,6 @@ def index_certfr_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -68033,7 +66338,6 @@ def _index_certfr_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -68134,10 +66438,6 @@ def _index_certfr_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -68219,8 +66519,7 @@ def index_chainguard_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -68278,10 +66577,8 @@ def index_chainguard_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -68335,7 +66632,6 @@ def index_chainguard_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -68384,8 +66680,7 @@ def index_chainguard_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -68443,10 +66738,8 @@ def index_chainguard_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -68500,7 +66793,6 @@ def index_chainguard_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -68549,8 +66841,7 @@ def index_chainguard_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -68608,10 +66899,8 @@ def index_chainguard_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -68665,7 +66954,6 @@ def index_chainguard_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -68710,7 +66998,6 @@ def _index_chainguard_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -68811,10 +67098,6 @@ def _index_chainguard_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -68896,8 +67179,7 @@ def index_checkpoint_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -68955,10 +67237,8 @@ def index_checkpoint_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69012,7 +67292,6 @@ def index_checkpoint_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69061,8 +67340,7 @@ def index_checkpoint_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69120,10 +67398,8 @@ def index_checkpoint_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69177,7 +67453,6 @@ def index_checkpoint_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69226,8 +67501,7 @@ def index_checkpoint_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69285,10 +67559,8 @@ def index_checkpoint_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69342,7 +67614,6 @@ def index_checkpoint_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69387,7 +67658,6 @@ def _index_checkpoint_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -69488,10 +67758,6 @@ def _index_checkpoint_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -69573,8 +67839,7 @@ def index_chrome_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69632,10 +67897,8 @@ def index_chrome_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69689,7 +67952,6 @@ def index_chrome_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69738,8 +68000,7 @@ def index_chrome_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69797,10 +68058,8 @@ def index_chrome_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -69854,7 +68113,6 @@ def index_chrome_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -69903,8 +68161,7 @@ def index_chrome_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -69962,10 +68219,8 @@ def index_chrome_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -70019,7 +68274,6 @@ def index_chrome_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -70064,7 +68318,6 @@ def _index_chrome_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -70165,10 +68418,6 @@ def _index_chrome_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -70250,8 +68499,7 @@ def index_ciena_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -70309,10 +68557,8 @@ def index_ciena_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -70366,7 +68612,6 @@ def index_ciena_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -70415,8 +68660,7 @@ def index_ciena_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -70474,10 +68718,8 @@ def index_ciena_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -70531,7 +68773,6 @@ def index_ciena_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -70580,8 +68821,7 @@ def index_ciena_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -70639,10 +68879,8 @@ def index_ciena_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -70696,7 +68934,6 @@ def index_ciena_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -70741,7 +68978,6 @@ def _index_ciena_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -70842,10 +69078,6 @@ def _index_ciena_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -70927,8 +69159,7 @@ def index_cisa_alerts_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -70986,10 +69217,8 @@ def index_cisa_alerts_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71043,7 +69272,6 @@ def index_cisa_alerts_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71092,8 +69320,7 @@ def index_cisa_alerts_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71151,10 +69378,8 @@ def index_cisa_alerts_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71208,7 +69433,6 @@ def index_cisa_alerts_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71257,8 +69481,7 @@ def index_cisa_alerts_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71316,10 +69539,8 @@ def index_cisa_alerts_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71373,7 +69594,6 @@ def index_cisa_alerts_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71418,7 +69638,6 @@ def _index_cisa_alerts_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -71519,10 +69738,6 @@ def _index_cisa_alerts_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -71604,8 +69819,7 @@ def index_cisa_csaf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71663,10 +69877,8 @@ def index_cisa_csaf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71720,7 +69932,6 @@ def index_cisa_csaf_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71769,8 +69980,7 @@ def index_cisa_csaf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71828,10 +70038,8 @@ def index_cisa_csaf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -71885,7 +70093,6 @@ def index_cisa_csaf_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -71934,8 +70141,7 @@ def index_cisa_csaf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -71993,10 +70199,8 @@ def index_cisa_csaf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -72050,7 +70254,6 @@ def index_cisa_csaf_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -72095,7 +70298,6 @@ def _index_cisa_csaf_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -72196,10 +70398,6 @@ def _index_cisa_csaf_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -72281,8 +70479,7 @@ def index_cisa_kev_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -72340,10 +70537,8 @@ def index_cisa_kev_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -72397,7 +70592,6 @@ def index_cisa_kev_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -72446,8 +70640,7 @@ def index_cisa_kev_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -72505,10 +70698,8 @@ def index_cisa_kev_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -72562,7 +70753,6 @@ def index_cisa_kev_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -72611,8 +70801,7 @@ def index_cisa_kev_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -72670,10 +70859,8 @@ def index_cisa_kev_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -72727,7 +70914,6 @@ def index_cisa_kev_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -72772,7 +70958,6 @@ def _index_cisa_kev_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -72873,10 +71058,6 @@ def _index_cisa_kev_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -72958,8 +71139,7 @@ def index_cisco_csaf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73017,10 +71197,8 @@ def index_cisco_csaf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73074,7 +71252,6 @@ def index_cisco_csaf_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73123,8 +71300,7 @@ def index_cisco_csaf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73182,10 +71358,8 @@ def index_cisco_csaf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73239,7 +71413,6 @@ def index_cisco_csaf_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73288,8 +71461,7 @@ def index_cisco_csaf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73347,10 +71519,8 @@ def index_cisco_csaf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73404,7 +71574,6 @@ def index_cisco_csaf_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73449,7 +71618,6 @@ def _index_cisco_csaf_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -73550,10 +71718,6 @@ def _index_cisco_csaf_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -73635,8 +71799,7 @@ def index_cisco_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73694,10 +71857,8 @@ def index_cisco_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73751,7 +71912,6 @@ def index_cisco_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73800,8 +71960,7 @@ def index_cisco_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -73859,10 +72018,8 @@ def index_cisco_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -73916,7 +72073,6 @@ def index_cisco_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -73965,8 +72121,7 @@ def index_cisco_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -74024,10 +72179,8 @@ def index_cisco_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -74081,7 +72234,6 @@ def index_cisco_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -74126,7 +72278,6 @@ def _index_cisco_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -74227,10 +72378,6 @@ def _index_cisco_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -74312,8 +72459,7 @@ def index_cisco_known_good_values_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -74371,10 +72517,8 @@ def index_cisco_known_good_values_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -74428,7 +72572,6 @@ def index_cisco_known_good_values_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -74477,8 +72620,7 @@ def index_cisco_known_good_values_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -74536,10 +72678,8 @@ def index_cisco_known_good_values_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -74593,7 +72733,6 @@ def index_cisco_known_good_values_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -74642,8 +72781,7 @@ def index_cisco_known_good_values_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -74701,10 +72839,8 @@ def index_cisco_known_good_values_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -74758,7 +72894,6 @@ def index_cisco_known_good_values_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -74803,7 +72938,6 @@ def _index_cisco_known_good_values_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -74904,10 +73038,6 @@ def _index_cisco_known_good_values_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -74989,8 +73119,7 @@ def index_cisco_talos_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75048,10 +73177,8 @@ def index_cisco_talos_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75105,7 +73232,6 @@ def index_cisco_talos_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75154,8 +73280,7 @@ def index_cisco_talos_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75213,10 +73338,8 @@ def index_cisco_talos_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75270,7 +73393,6 @@ def index_cisco_talos_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75319,8 +73441,7 @@ def index_cisco_talos_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75378,10 +73499,8 @@ def index_cisco_talos_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75435,7 +73554,6 @@ def index_cisco_talos_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75480,7 +73598,6 @@ def _index_cisco_talos_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -75581,10 +73698,6 @@ def _index_cisco_talos_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -75666,8 +73779,7 @@ def index_citrix_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75725,10 +73837,8 @@ def index_citrix_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75782,7 +73892,6 @@ def index_citrix_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75831,8 +73940,7 @@ def index_citrix_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -75890,10 +73998,8 @@ def index_citrix_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -75947,7 +74053,6 @@ def index_citrix_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -75996,8 +74101,7 @@ def index_citrix_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -76055,10 +74159,8 @@ def index_citrix_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -76112,7 +74214,6 @@ def index_citrix_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -76157,7 +74258,6 @@ def _index_citrix_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -76258,10 +74358,6 @@ def _index_citrix_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -76343,8 +74439,7 @@ def index_claroty_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -76402,10 +74497,8 @@ def index_claroty_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -76459,7 +74552,6 @@ def index_claroty_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -76508,8 +74600,7 @@ def index_claroty_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -76567,10 +74658,8 @@ def index_claroty_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -76624,7 +74713,6 @@ def index_claroty_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -76673,8 +74761,7 @@ def index_claroty_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -76732,10 +74819,8 @@ def index_claroty_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -76789,7 +74874,6 @@ def index_claroty_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -76834,7 +74918,6 @@ def _index_claroty_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -76935,10 +75018,6 @@ def _index_claroty_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -77020,8 +75099,7 @@ def index_cloudbees_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77079,10 +75157,8 @@ def index_cloudbees_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77136,7 +75212,6 @@ def index_cloudbees_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -77185,8 +75260,7 @@ def index_cloudbees_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77244,10 +75318,8 @@ def index_cloudbees_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77301,7 +75373,6 @@ def index_cloudbees_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -77350,8 +75421,7 @@ def index_cloudbees_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77409,10 +75479,8 @@ def index_cloudbees_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77466,7 +75534,6 @@ def index_cloudbees_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -77511,7 +75578,6 @@ def _index_cloudbees_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -77612,10 +75678,6 @@ def _index_cloudbees_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -77697,8 +75759,7 @@ def index_cloudvulndb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77756,10 +75817,8 @@ def index_cloudvulndb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77813,7 +75872,6 @@ def index_cloudvulndb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -77862,8 +75920,7 @@ def index_cloudvulndb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -77921,10 +75978,8 @@ def index_cloudvulndb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -77978,7 +76033,6 @@ def index_cloudvulndb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78027,8 +76081,7 @@ def index_cloudvulndb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -78086,10 +76139,8 @@ def index_cloudvulndb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -78143,7 +76194,6 @@ def index_cloudvulndb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78188,7 +76238,6 @@ def _index_cloudvulndb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -78289,10 +76338,6 @@ def _index_cloudvulndb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -78374,8 +76419,7 @@ def index_cnnvd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -78433,10 +76477,8 @@ def index_cnnvd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -78490,7 +76532,6 @@ def index_cnnvd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78539,8 +76580,7 @@ def index_cnnvd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -78598,10 +76638,8 @@ def index_cnnvd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -78655,7 +76693,6 @@ def index_cnnvd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78704,8 +76741,7 @@ def index_cnnvd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -78763,10 +76799,8 @@ def index_cnnvd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -78820,7 +76854,6 @@ def index_cnnvd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -78865,7 +76898,6 @@ def _index_cnnvd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -78966,10 +76998,6 @@ def _index_cnnvd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -79051,8 +77079,7 @@ def index_cnvd_bulletins_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79110,10 +77137,8 @@ def index_cnvd_bulletins_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -79167,7 +77192,6 @@ def index_cnvd_bulletins_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -79216,8 +77240,7 @@ def index_cnvd_bulletins_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79275,10 +77298,8 @@ def index_cnvd_bulletins_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -79332,7 +77353,6 @@ def index_cnvd_bulletins_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -79381,8 +77401,7 @@ def index_cnvd_bulletins_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79440,10 +77459,8 @@ def index_cnvd_bulletins_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -79497,7 +77514,6 @@ def index_cnvd_bulletins_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -79542,7 +77558,6 @@ def _index_cnvd_bulletins_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -79643,10 +77658,6 @@ def _index_cnvd_bulletins_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -79728,8 +77739,7 @@ def index_cnvd_flaws_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79787,10 +77797,8 @@ def index_cnvd_flaws_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -79844,7 +77852,6 @@ def index_cnvd_flaws_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -79893,8 +77900,7 @@ def index_cnvd_flaws_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -79952,10 +77958,8 @@ def index_cnvd_flaws_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80009,7 +78013,6 @@ def index_cnvd_flaws_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80058,8 +78061,7 @@ def index_cnvd_flaws_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -80117,10 +78119,8 @@ def index_cnvd_flaws_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80174,7 +78174,6 @@ def index_cnvd_flaws_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80219,7 +78218,6 @@ def _index_cnvd_flaws_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -80320,10 +78318,6 @@ def _index_cnvd_flaws_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -80405,8 +78399,7 @@ def index_cocoapods_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -80464,10 +78457,8 @@ def index_cocoapods_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80521,7 +78512,6 @@ def index_cocoapods_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80570,8 +78560,7 @@ def index_cocoapods_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -80629,10 +78618,8 @@ def index_cocoapods_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80686,7 +78673,6 @@ def index_cocoapods_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80735,8 +78721,7 @@ def index_cocoapods_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -80794,10 +78779,8 @@ def index_cocoapods_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -80851,7 +78834,6 @@ def index_cocoapods_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -80896,7 +78878,6 @@ def _index_cocoapods_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -80997,10 +78978,6 @@ def _index_cocoapods_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -81082,8 +79059,7 @@ def index_codesys_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81141,10 +79117,8 @@ def index_codesys_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -81198,7 +79172,6 @@ def index_codesys_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -81247,8 +79220,7 @@ def index_codesys_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81306,10 +79278,8 @@ def index_codesys_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -81363,7 +79333,6 @@ def index_codesys_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -81412,8 +79381,7 @@ def index_codesys_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81471,10 +79439,8 @@ def index_codesys_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -81528,7 +79494,6 @@ def index_codesys_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -81573,7 +79538,6 @@ def _index_codesys_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -81674,10 +79638,6 @@ def _index_codesys_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -81759,8 +79719,7 @@ def index_commvault_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81818,10 +79777,8 @@ def index_commvault_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -81875,7 +79832,6 @@ def index_commvault_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -81924,8 +79880,7 @@ def index_commvault_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -81983,10 +79938,8 @@ def index_commvault_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82040,7 +79993,6 @@ def index_commvault_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82089,8 +80041,7 @@ def index_commvault_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -82148,10 +80099,8 @@ def index_commvault_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82205,7 +80154,6 @@ def index_commvault_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82250,7 +80198,6 @@ def _index_commvault_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -82351,10 +80298,6 @@ def _index_commvault_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -82436,8 +80379,7 @@ def index_compass_security_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -82495,10 +80437,8 @@ def index_compass_security_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82552,7 +80492,6 @@ def index_compass_security_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82601,8 +80540,7 @@ def index_compass_security_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -82660,10 +80598,8 @@ def index_compass_security_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82717,7 +80653,6 @@ def index_compass_security_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82766,8 +80701,7 @@ def index_compass_security_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -82825,10 +80759,8 @@ def index_compass_security_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -82882,7 +80814,6 @@ def index_compass_security_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -82927,7 +80858,6 @@ def _index_compass_security_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -83028,10 +80958,6 @@ def _index_compass_security_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -83113,8 +81039,7 @@ def index_composer_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83172,10 +81097,8 @@ def index_composer_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -83229,7 +81152,6 @@ def index_composer_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -83278,8 +81200,7 @@ def index_composer_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83337,10 +81258,8 @@ def index_composer_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -83394,7 +81313,6 @@ def index_composer_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -83443,8 +81361,7 @@ def index_composer_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83502,10 +81419,8 @@ def index_composer_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -83559,7 +81474,6 @@ def index_composer_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -83604,7 +81518,6 @@ def _index_composer_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -83705,10 +81618,6 @@ def _index_composer_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -83790,8 +81699,7 @@ def index_conan_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -83849,10 +81757,8 @@ def index_conan_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -83906,7 +81812,6 @@ def index_conan_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -83955,8 +81860,7 @@ def index_conan_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84014,10 +81918,8 @@ def index_conan_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84071,7 +81973,6 @@ def index_conan_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84120,8 +82021,7 @@ def index_conan_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84179,10 +82079,8 @@ def index_conan_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84236,7 +82134,6 @@ def index_conan_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84281,7 +82178,6 @@ def _index_conan_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -84382,10 +82278,6 @@ def _index_conan_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -84467,8 +82359,7 @@ def index_coreimpact_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84526,10 +82417,8 @@ def index_coreimpact_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84583,7 +82472,6 @@ def index_coreimpact_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84632,8 +82520,7 @@ def index_coreimpact_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84691,10 +82578,8 @@ def index_coreimpact_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84748,7 +82633,6 @@ def index_coreimpact_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84797,8 +82681,7 @@ def index_coreimpact_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -84856,10 +82739,8 @@ def index_coreimpact_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -84913,7 +82794,6 @@ def index_coreimpact_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -84958,7 +82838,6 @@ def _index_coreimpact_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -85059,10 +82938,6 @@ def _index_coreimpact_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -85144,8 +83019,7 @@ def index_cpe_vulnerable_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -85203,10 +83077,8 @@ def index_cpe_vulnerable_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -85260,7 +83132,6 @@ def index_cpe_vulnerable_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -85309,8 +83180,7 @@ def index_cpe_vulnerable_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -85368,10 +83238,8 @@ def index_cpe_vulnerable_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -85425,7 +83293,6 @@ def index_cpe_vulnerable_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -85474,8 +83341,7 @@ def index_cpe_vulnerable_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -85533,10 +83399,8 @@ def index_cpe_vulnerable_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -85590,7 +83454,6 @@ def index_cpe_vulnerable_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -85635,7 +83498,6 @@ def _index_cpe_vulnerable_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -85736,10 +83598,6 @@ def _index_cpe_vulnerable_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -85821,8 +83679,7 @@ def index_crestron_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -85880,10 +83737,8 @@ def index_crestron_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -85937,7 +83792,6 @@ def index_crestron_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -85986,8 +83840,7 @@ def index_crestron_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86045,10 +83898,8 @@ def index_crestron_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86102,7 +83953,6 @@ def index_crestron_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86151,8 +84001,7 @@ def index_crestron_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86210,10 +84059,8 @@ def index_crestron_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86267,7 +84114,6 @@ def index_crestron_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86312,7 +84158,6 @@ def _index_crestron_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -86413,10 +84258,6 @@ def _index_crestron_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -86498,8 +84339,7 @@ def index_crowdsec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86557,10 +84397,8 @@ def index_crowdsec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86614,7 +84452,6 @@ def index_crowdsec_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86663,8 +84500,7 @@ def index_crowdsec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86722,10 +84558,8 @@ def index_crowdsec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86779,7 +84613,6 @@ def index_crowdsec_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86828,8 +84661,7 @@ def index_crowdsec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -86887,10 +84719,8 @@ def index_crowdsec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -86944,7 +84774,6 @@ def index_crowdsec_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -86989,7 +84818,6 @@ def _index_crowdsec_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -87090,10 +84918,6 @@ def _index_crowdsec_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -87175,8 +84999,7 @@ def index_curl_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -87234,10 +85057,8 @@ def index_curl_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -87291,7 +85112,6 @@ def index_curl_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -87340,8 +85160,7 @@ def index_curl_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -87399,10 +85218,8 @@ def index_curl_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -87456,7 +85273,6 @@ def index_curl_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -87505,8 +85321,7 @@ def index_curl_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -87564,10 +85379,8 @@ def index_curl_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -87621,7 +85434,6 @@ def index_curl_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -87666,7 +85478,6 @@ def _index_curl_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -87767,10 +85578,6 @@ def _index_curl_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -87852,8 +85659,7 @@ def index_cwe_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -87911,10 +85717,8 @@ def index_cwe_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -87968,7 +85772,6 @@ def index_cwe_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88017,8 +85820,7 @@ def index_cwe_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88076,10 +85878,8 @@ def index_cwe_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88133,7 +85933,6 @@ def index_cwe_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88182,8 +85981,7 @@ def index_cwe_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88241,10 +86039,8 @@ def index_cwe_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88298,7 +86094,6 @@ def index_cwe_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88343,7 +86138,6 @@ def _index_cwe_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -88444,10 +86238,6 @@ def _index_cwe_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -88529,8 +86319,7 @@ def index_dahua_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88588,10 +86377,8 @@ def index_dahua_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88645,7 +86432,6 @@ def index_dahua_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88694,8 +86480,7 @@ def index_dahua_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88753,10 +86538,8 @@ def index_dahua_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88810,7 +86593,6 @@ def index_dahua_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -88859,8 +86641,7 @@ def index_dahua_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -88918,10 +86699,8 @@ def index_dahua_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -88975,7 +86754,6 @@ def index_dahua_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -89020,7 +86798,6 @@ def _index_dahua_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -89121,10 +86898,6 @@ def _index_dahua_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -89206,8 +86979,7 @@ def index_danfoss_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -89265,10 +87037,8 @@ def index_danfoss_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -89322,7 +87092,6 @@ def index_danfoss_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -89371,8 +87140,7 @@ def index_danfoss_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -89430,10 +87198,8 @@ def index_danfoss_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -89487,7 +87253,6 @@ def index_danfoss_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -89536,8 +87301,7 @@ def index_danfoss_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -89595,10 +87359,8 @@ def index_danfoss_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -89652,7 +87414,6 @@ def index_danfoss_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -89697,7 +87458,6 @@ def _index_danfoss_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -89798,10 +87558,6 @@ def _index_danfoss_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -89883,8 +87639,7 @@ def index_dassault_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -89942,10 +87697,8 @@ def index_dassault_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -89999,7 +87752,6 @@ def index_dassault_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90048,8 +87800,7 @@ def index_dassault_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90107,10 +87858,8 @@ def index_dassault_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -90164,7 +87913,6 @@ def index_dassault_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90213,8 +87961,7 @@ def index_dassault_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90272,10 +88019,8 @@ def index_dassault_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -90329,7 +88074,6 @@ def index_dassault_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90374,7 +88118,6 @@ def _index_dassault_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -90475,10 +88218,6 @@ def _index_dassault_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -90560,8 +88299,7 @@ def index_debian_dsa_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90619,10 +88357,8 @@ def index_debian_dsa_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -90676,7 +88412,6 @@ def index_debian_dsa_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90725,8 +88460,7 @@ def index_debian_dsa_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90784,10 +88518,8 @@ def index_debian_dsa_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -90841,7 +88573,6 @@ def index_debian_dsa_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -90890,8 +88621,7 @@ def index_debian_dsa_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -90949,10 +88679,8 @@ def index_debian_dsa_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -91006,7 +88734,6 @@ def index_debian_dsa_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -91051,7 +88778,6 @@ def _index_debian_dsa_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -91152,10 +88878,6 @@ def _index_debian_dsa_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -91237,8 +88959,7 @@ def index_debian_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -91296,10 +89017,8 @@ def index_debian_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -91353,7 +89072,6 @@ def index_debian_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -91402,8 +89120,7 @@ def index_debian_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -91461,10 +89178,8 @@ def index_debian_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -91518,7 +89233,6 @@ def index_debian_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -91567,8 +89281,7 @@ def index_debian_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -91626,10 +89339,8 @@ def index_debian_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -91683,7 +89394,6 @@ def index_debian_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -91728,7 +89438,6 @@ def _index_debian_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -91829,10 +89538,6 @@ def _index_debian_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -91914,8 +89619,7 @@ def index_debian_packages_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -91973,10 +89677,8 @@ def index_debian_packages_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92030,7 +89732,6 @@ def index_debian_packages_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92079,8 +89780,7 @@ def index_debian_packages_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92138,10 +89838,8 @@ def index_debian_packages_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92195,7 +89893,6 @@ def index_debian_packages_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92244,8 +89941,7 @@ def index_debian_packages_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92303,10 +89999,8 @@ def index_debian_packages_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92360,7 +90054,6 @@ def index_debian_packages_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92405,7 +90098,6 @@ def _index_debian_packages_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -92506,10 +90198,6 @@ def _index_debian_packages_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -92591,8 +90279,7 @@ def index_debian_purls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92650,10 +90337,8 @@ def index_debian_purls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92707,7 +90392,6 @@ def index_debian_purls_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92756,8 +90440,7 @@ def index_debian_purls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92815,10 +90498,8 @@ def index_debian_purls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -92872,7 +90553,6 @@ def index_debian_purls_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -92921,8 +90601,7 @@ def index_debian_purls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -92980,10 +90659,8 @@ def index_debian_purls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -93037,7 +90714,6 @@ def index_debian_purls_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -93082,7 +90758,6 @@ def _index_debian_purls_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -93183,10 +90858,6 @@ def _index_debian_purls_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -93268,8 +90939,7 @@ def index_dell_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -93327,10 +90997,8 @@ def index_dell_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -93384,7 +91052,6 @@ def index_dell_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -93433,8 +91100,7 @@ def index_dell_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -93492,10 +91158,8 @@ def index_dell_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -93549,7 +91213,6 @@ def index_dell_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -93598,8 +91261,7 @@ def index_dell_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -93657,10 +91319,8 @@ def index_dell_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -93714,7 +91374,6 @@ def index_dell_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -93759,7 +91418,6 @@ def _index_dell_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -93860,10 +91518,6 @@ def _index_dell_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -93945,8 +91599,7 @@ def index_delta_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94004,10 +91657,8 @@ def index_delta_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94061,7 +91712,6 @@ def index_delta_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94110,8 +91760,7 @@ def index_delta_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94169,10 +91818,8 @@ def index_delta_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94226,7 +91873,6 @@ def index_delta_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94275,8 +91921,7 @@ def index_delta_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94334,10 +91979,8 @@ def index_delta_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94391,7 +92034,6 @@ def index_delta_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94436,7 +92078,6 @@ def _index_delta_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -94537,10 +92178,6 @@ def _index_delta_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -94622,8 +92259,7 @@ def index_dfn_cert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94681,10 +92317,8 @@ def index_dfn_cert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94738,7 +92372,6 @@ def index_dfn_cert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94787,8 +92420,7 @@ def index_dfn_cert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -94846,10 +92478,8 @@ def index_dfn_cert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -94903,7 +92533,6 @@ def index_dfn_cert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -94952,8 +92581,7 @@ def index_dfn_cert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -95011,10 +92639,8 @@ def index_dfn_cert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -95068,7 +92694,6 @@ def index_dfn_cert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -95113,7 +92738,6 @@ def _index_dfn_cert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -95214,10 +92838,6 @@ def _index_dfn_cert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -95299,8 +92919,7 @@ def index_django_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -95358,10 +92977,8 @@ def index_django_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -95415,7 +93032,6 @@ def index_django_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -95464,8 +93080,7 @@ def index_django_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -95523,10 +93138,8 @@ def index_django_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -95580,7 +93193,6 @@ def index_django_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -95629,8 +93241,7 @@ def index_django_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -95688,10 +93299,8 @@ def index_django_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -95745,7 +93354,6 @@ def index_django_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -95790,7 +93398,6 @@ def _index_django_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -95891,10 +93498,6 @@ def _index_django_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -95976,8 +93579,7 @@ def index_dlink_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96035,10 +93637,8 @@ def index_dlink_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96092,7 +93692,6 @@ def index_dlink_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96141,8 +93740,7 @@ def index_dlink_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96200,10 +93798,8 @@ def index_dlink_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96257,7 +93853,6 @@ def index_dlink_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96306,8 +93901,7 @@ def index_dlink_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96365,10 +93959,8 @@ def index_dlink_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96422,7 +94014,6 @@ def index_dlink_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96467,7 +94058,6 @@ def _index_dlink_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -96568,10 +94158,6 @@ def _index_dlink_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -96653,8 +94239,7 @@ def index_dnn_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96712,10 +94297,8 @@ def index_dnn_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96769,7 +94352,6 @@ def index_dnn_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96818,8 +94400,7 @@ def index_dnn_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -96877,10 +94458,8 @@ def index_dnn_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -96934,7 +94513,6 @@ def index_dnn_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -96983,8 +94561,7 @@ def index_dnn_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -97042,10 +94619,8 @@ def index_dnn_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -97099,7 +94674,6 @@ def index_dnn_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -97144,7 +94718,6 @@ def _index_dnn_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -97245,10 +94818,6 @@ def _index_dnn_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -97330,8 +94899,7 @@ def index_dotcms_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -97389,10 +94957,8 @@ def index_dotcms_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -97446,7 +95012,6 @@ def index_dotcms_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -97495,8 +95060,7 @@ def index_dotcms_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -97554,10 +95118,8 @@ def index_dotcms_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -97611,7 +95173,6 @@ def index_dotcms_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -97660,8 +95221,7 @@ def index_dotcms_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -97719,10 +95279,8 @@ def index_dotcms_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -97776,7 +95334,6 @@ def index_dotcms_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -97821,7 +95378,6 @@ def _index_dotcms_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -97922,10 +95478,6 @@ def _index_dotcms_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -98007,8 +95559,7 @@ def index_dragos_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98066,10 +95617,8 @@ def index_dragos_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98123,7 +95672,6 @@ def index_dragos_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -98172,8 +95720,7 @@ def index_dragos_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98231,10 +95778,8 @@ def index_dragos_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98288,7 +95833,6 @@ def index_dragos_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -98337,8 +95881,7 @@ def index_dragos_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98396,10 +95939,8 @@ def index_dragos_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98453,7 +95994,6 @@ def index_dragos_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -98498,7 +96038,6 @@ def _index_dragos_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -98599,10 +96138,6 @@ def _index_dragos_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -98684,8 +96219,7 @@ def index_draytek_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98743,10 +96277,8 @@ def index_draytek_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98800,7 +96332,6 @@ def index_draytek_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -98849,8 +96380,7 @@ def index_draytek_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -98908,10 +96438,8 @@ def index_draytek_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -98965,7 +96493,6 @@ def index_draytek_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99014,8 +96541,7 @@ def index_draytek_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -99073,10 +96599,8 @@ def index_draytek_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -99130,7 +96654,6 @@ def index_draytek_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99175,7 +96698,6 @@ def _index_draytek_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -99276,10 +96798,6 @@ def _index_draytek_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -99361,8 +96879,7 @@ def index_drupal_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -99420,10 +96937,8 @@ def index_drupal_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -99477,7 +96992,6 @@ def index_drupal_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99526,8 +97040,7 @@ def index_drupal_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -99585,10 +97098,8 @@ def index_drupal_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -99642,7 +97153,6 @@ def index_drupal_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99691,8 +97201,7 @@ def index_drupal_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -99750,10 +97259,8 @@ def index_drupal_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -99807,7 +97314,6 @@ def index_drupal_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -99852,7 +97358,6 @@ def _index_drupal_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -99953,10 +97458,6 @@ def _index_drupal_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -100038,8 +97539,7 @@ def index_eaton_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100097,10 +97597,8 @@ def index_eaton_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100154,7 +97652,6 @@ def index_eaton_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -100203,8 +97700,7 @@ def index_eaton_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100262,10 +97758,8 @@ def index_eaton_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100319,7 +97813,6 @@ def index_eaton_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -100368,8 +97861,7 @@ def index_eaton_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100427,10 +97919,8 @@ def index_eaton_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100484,7 +97974,6 @@ def index_eaton_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -100529,7 +98018,6 @@ def _index_eaton_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -100630,10 +98118,6 @@ def _index_eaton_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -100715,8 +98199,7 @@ def index_elastic_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100774,10 +98257,8 @@ def index_elastic_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100831,7 +98312,6 @@ def index_elastic_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -100880,8 +98360,7 @@ def index_elastic_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -100939,10 +98418,8 @@ def index_elastic_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -100996,7 +98473,6 @@ def index_elastic_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101045,8 +98521,7 @@ def index_elastic_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -101104,10 +98579,8 @@ def index_elastic_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -101161,7 +98634,6 @@ def index_elastic_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101206,7 +98678,6 @@ def _index_elastic_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -101307,10 +98778,6 @@ def _index_elastic_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -101392,8 +98859,7 @@ def index_elspec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -101451,10 +98917,8 @@ def index_elspec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -101508,7 +98972,6 @@ def index_elspec_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101557,8 +99020,7 @@ def index_elspec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -101616,10 +99078,8 @@ def index_elspec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -101673,7 +99133,6 @@ def index_elspec_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101722,8 +99181,7 @@ def index_elspec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -101781,10 +99239,8 @@ def index_elspec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -101838,7 +99294,6 @@ def index_elspec_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -101883,7 +99338,6 @@ def _index_elspec_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -101984,10 +99438,6 @@ def _index_elspec_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -102069,8 +99519,7 @@ def index_emerging_threats_snort_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102128,10 +99577,8 @@ def index_emerging_threats_snort_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -102185,7 +99632,6 @@ def index_emerging_threats_snort_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -102234,8 +99680,7 @@ def index_emerging_threats_snort_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102293,10 +99738,8 @@ def index_emerging_threats_snort_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -102350,7 +99793,6 @@ def index_emerging_threats_snort_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -102399,8 +99841,7 @@ def index_emerging_threats_snort_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102458,10 +99899,8 @@ def index_emerging_threats_snort_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -102515,7 +99954,6 @@ def index_emerging_threats_snort_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -102560,7 +99998,6 @@ def _index_emerging_threats_snort_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -102661,10 +100098,6 @@ def _index_emerging_threats_snort_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -102746,8 +100179,7 @@ def index_emerson_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102805,10 +100237,8 @@ def index_emerson_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -102862,7 +100292,6 @@ def index_emerson_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -102911,8 +100340,7 @@ def index_emerson_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -102970,10 +100398,8 @@ def index_emerson_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103027,7 +100453,6 @@ def index_emerson_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103076,8 +100501,7 @@ def index_emerson_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -103135,10 +100559,8 @@ def index_emerson_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103192,7 +100614,6 @@ def index_emerson_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103237,7 +100658,6 @@ def _index_emerson_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -103338,10 +100758,6 @@ def _index_emerson_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -103423,8 +100839,7 @@ def index_endoflife_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -103482,10 +100897,8 @@ def index_endoflife_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103539,7 +100952,6 @@ def index_endoflife_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103588,8 +101000,7 @@ def index_endoflife_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -103647,10 +101058,8 @@ def index_endoflife_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103704,7 +101113,6 @@ def index_endoflife_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103753,8 +101161,7 @@ def index_endoflife_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -103812,10 +101219,8 @@ def index_endoflife_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -103869,7 +101274,6 @@ def index_endoflife_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -103914,7 +101318,6 @@ def _index_endoflife_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -104015,10 +101418,6 @@ def _index_endoflife_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -104100,8 +101499,7 @@ def index_endress_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104159,10 +101557,8 @@ def index_endress_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -104216,7 +101612,6 @@ def index_endress_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -104265,8 +101660,7 @@ def index_endress_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104324,10 +101718,8 @@ def index_endress_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -104381,7 +101773,6 @@ def index_endress_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -104430,8 +101821,7 @@ def index_endress_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104489,10 +101879,8 @@ def index_endress_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -104546,7 +101934,6 @@ def index_endress_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -104591,7 +101978,6 @@ def _index_endress_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -104692,10 +102078,6 @@ def _index_endress_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -104777,8 +102159,7 @@ def index_eol_alibaba_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -104836,10 +102217,8 @@ def index_eol_alibaba_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -104893,7 +102272,6 @@ def index_eol_alibaba_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -104942,8 +102320,7 @@ def index_eol_alibaba_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105001,10 +102378,8 @@ def index_eol_alibaba_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105058,7 +102433,6 @@ def index_eol_alibaba_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105107,8 +102481,7 @@ def index_eol_alibaba_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105166,10 +102539,8 @@ def index_eol_alibaba_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105223,7 +102594,6 @@ def index_eol_alibaba_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105268,7 +102638,6 @@ def _index_eol_alibaba_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -105369,10 +102738,6 @@ def _index_eol_alibaba_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -105454,8 +102819,7 @@ def index_eol_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105513,10 +102877,8 @@ def index_eol_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105570,7 +102932,6 @@ def index_eol_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105619,8 +102980,7 @@ def index_eol_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105678,10 +103038,8 @@ def index_eol_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105735,7 +103093,6 @@ def index_eol_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105784,8 +103141,7 @@ def index_eol_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -105843,10 +103199,8 @@ def index_eol_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -105900,7 +103254,6 @@ def index_eol_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -105945,7 +103298,6 @@ def _index_eol_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -106046,10 +103398,6 @@ def _index_eol_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -106131,8 +103479,7 @@ def index_eol_microsoft_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106190,10 +103537,8 @@ def index_eol_microsoft_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -106247,7 +103592,6 @@ def index_eol_microsoft_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -106296,8 +103640,7 @@ def index_eol_microsoft_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106355,10 +103698,8 @@ def index_eol_microsoft_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -106412,7 +103753,6 @@ def index_eol_microsoft_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -106461,8 +103801,7 @@ def index_eol_microsoft_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106520,10 +103859,8 @@ def index_eol_microsoft_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -106577,7 +103914,6 @@ def index_eol_microsoft_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -106622,7 +103958,6 @@ def _index_eol_microsoft_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -106723,10 +104058,6 @@ def _index_eol_microsoft_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -106808,8 +104139,7 @@ def index_epss_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -106867,10 +104197,8 @@ def index_epss_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -106924,7 +104252,6 @@ def index_epss_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -106973,8 +104300,7 @@ def index_epss_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107032,10 +104358,8 @@ def index_epss_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107089,7 +104413,6 @@ def index_epss_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107138,8 +104461,7 @@ def index_epss_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107197,10 +104519,8 @@ def index_epss_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107254,7 +104574,6 @@ def index_epss_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107299,7 +104618,6 @@ def _index_epss_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -107400,10 +104718,6 @@ def _index_epss_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -107485,8 +104799,7 @@ def index_euvd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107544,10 +104857,8 @@ def index_euvd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107601,7 +104912,6 @@ def index_euvd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107650,8 +104960,7 @@ def index_euvd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107709,10 +105018,8 @@ def index_euvd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107766,7 +105073,6 @@ def index_euvd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107815,8 +105121,7 @@ def index_euvd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -107874,10 +105179,8 @@ def index_euvd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -107931,7 +105234,6 @@ def index_euvd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -107976,7 +105278,6 @@ def _index_euvd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -108077,10 +105378,6 @@ def _index_euvd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -108162,8 +105459,7 @@ def index_exodus_intel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -108221,10 +105517,8 @@ def index_exodus_intel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -108278,7 +105572,6 @@ def index_exodus_intel_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -108327,8 +105620,7 @@ def index_exodus_intel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -108386,10 +105678,8 @@ def index_exodus_intel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -108443,7 +105733,6 @@ def index_exodus_intel_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -108492,8 +105781,7 @@ def index_exodus_intel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -108551,10 +105839,8 @@ def index_exodus_intel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -108608,7 +105894,6 @@ def index_exodus_intel_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -108653,7 +105938,6 @@ def _index_exodus_intel_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -108754,10 +106038,6 @@ def _index_exodus_intel_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -108839,8 +106119,7 @@ def index_exploit_chains_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -108898,10 +106177,8 @@ def index_exploit_chains_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -108955,7 +106232,6 @@ def index_exploit_chains_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109004,8 +106280,7 @@ def index_exploit_chains_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109063,10 +106338,8 @@ def index_exploit_chains_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109120,7 +106393,6 @@ def index_exploit_chains_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109169,8 +106441,7 @@ def index_exploit_chains_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109228,10 +106499,8 @@ def index_exploit_chains_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109285,7 +106554,6 @@ def index_exploit_chains_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109330,7 +106598,6 @@ def _index_exploit_chains_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -109431,10 +106698,6 @@ def _index_exploit_chains_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -109516,8 +106779,7 @@ def index_exploitdb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109575,10 +106837,8 @@ def index_exploitdb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109632,7 +106892,6 @@ def index_exploitdb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109681,8 +106940,7 @@ def index_exploitdb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109740,10 +106998,8 @@ def index_exploitdb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109797,7 +107053,6 @@ def index_exploitdb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -109846,8 +107101,7 @@ def index_exploitdb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -109905,10 +107159,8 @@ def index_exploitdb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -109962,7 +107214,6 @@ def index_exploitdb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -110007,7 +107258,6 @@ def _index_exploitdb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -110108,10 +107358,6 @@ def _index_exploitdb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -110193,8 +107439,7 @@ def index_exploits_changelog_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -110252,10 +107497,8 @@ def index_exploits_changelog_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -110309,7 +107552,6 @@ def index_exploits_changelog_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -110358,8 +107600,7 @@ def index_exploits_changelog_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -110417,10 +107658,8 @@ def index_exploits_changelog_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -110474,7 +107713,6 @@ def index_exploits_changelog_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -110523,8 +107761,7 @@ def index_exploits_changelog_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -110582,10 +107819,8 @@ def index_exploits_changelog_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -110639,7 +107874,6 @@ def index_exploits_changelog_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -110684,7 +107918,6 @@ def _index_exploits_changelog_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -110785,10 +108018,6 @@ def _index_exploits_changelog_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -110870,8 +108099,7 @@ def index_exploits_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -110929,10 +108157,8 @@ def index_exploits_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -110986,7 +108212,6 @@ def index_exploits_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111035,8 +108260,7 @@ def index_exploits_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111094,10 +108318,8 @@ def index_exploits_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111151,7 +108373,6 @@ def index_exploits_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111200,8 +108421,7 @@ def index_exploits_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111259,10 +108479,8 @@ def index_exploits_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111316,7 +108534,6 @@ def index_exploits_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111361,7 +108578,6 @@ def _index_exploits_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -111462,10 +108678,6 @@ def _index_exploits_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -111547,8 +108759,7 @@ def index_f5_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111606,10 +108817,8 @@ def index_f5_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111663,7 +108872,6 @@ def index_f5_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111712,8 +108920,7 @@ def index_f5_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111771,10 +108978,8 @@ def index_f5_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111828,7 +109033,6 @@ def index_f5_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -111877,8 +109081,7 @@ def index_f5_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -111936,10 +109139,8 @@ def index_f5_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -111993,7 +109194,6 @@ def index_f5_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -112038,7 +109238,6 @@ def _index_f5_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -112139,10 +109338,6 @@ def _index_f5_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -112224,8 +109419,7 @@ def index_f_secure_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -112283,10 +109477,8 @@ def index_f_secure_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -112340,7 +109532,6 @@ def index_f_secure_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -112389,8 +109580,7 @@ def index_f_secure_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -112448,10 +109638,8 @@ def index_f_secure_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -112505,7 +109693,6 @@ def index_f_secure_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -112554,8 +109741,7 @@ def index_f_secure_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -112613,10 +109799,8 @@ def index_f_secure_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -112670,7 +109854,6 @@ def index_f_secure_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -112715,7 +109898,6 @@ def _index_f_secure_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -112816,10 +109998,6 @@ def _index_f_secure_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -112901,8 +110079,7 @@ def index_fanuc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -112960,10 +110137,8 @@ def index_fanuc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113017,7 +110192,6 @@ def index_fanuc_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113066,8 +110240,7 @@ def index_fanuc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113125,10 +110298,8 @@ def index_fanuc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113182,7 +110353,6 @@ def index_fanuc_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113231,8 +110401,7 @@ def index_fanuc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113290,10 +110459,8 @@ def index_fanuc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113347,7 +110514,6 @@ def index_fanuc_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113392,7 +110558,6 @@ def _index_fanuc_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -113493,10 +110658,6 @@ def _index_fanuc_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -113578,8 +110739,7 @@ def index_fastly_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113637,10 +110797,8 @@ def index_fastly_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113694,7 +110852,6 @@ def index_fastly_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113743,8 +110900,7 @@ def index_fastly_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113802,10 +110958,8 @@ def index_fastly_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -113859,7 +111013,6 @@ def index_fastly_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -113908,8 +111061,7 @@ def index_fastly_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -113967,10 +111119,8 @@ def index_fastly_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -114024,7 +111174,6 @@ def index_fastly_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -114069,7 +111218,6 @@ def _index_fastly_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -114170,10 +111318,6 @@ def _index_fastly_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -114255,8 +111399,7 @@ def index_fedora_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -114314,10 +111457,8 @@ def index_fedora_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -114371,7 +111512,6 @@ def index_fedora_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -114420,8 +111560,7 @@ def index_fedora_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -114479,10 +111618,8 @@ def index_fedora_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -114536,7 +111673,6 @@ def index_fedora_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -114585,8 +111721,7 @@ def index_fedora_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -114644,10 +111779,8 @@ def index_fedora_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -114701,7 +111834,6 @@ def index_fedora_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -114746,7 +111878,6 @@ def _index_fedora_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -114847,10 +111978,6 @@ def _index_fedora_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -114932,8 +112059,7 @@ def index_festo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -114991,10 +112117,8 @@ def index_festo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115048,7 +112172,6 @@ def index_festo_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115097,8 +112220,7 @@ def index_festo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115156,10 +112278,8 @@ def index_festo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115213,7 +112333,6 @@ def index_festo_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115262,8 +112381,7 @@ def index_festo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115321,10 +112439,8 @@ def index_festo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115378,7 +112494,6 @@ def index_festo_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115423,7 +112538,6 @@ def _index_festo_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -115524,10 +112638,6 @@ def _index_festo_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -115609,8 +112719,7 @@ def index_filecloud_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115668,10 +112777,8 @@ def index_filecloud_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115725,7 +112832,6 @@ def index_filecloud_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115774,8 +112880,7 @@ def index_filecloud_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115833,10 +112938,8 @@ def index_filecloud_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -115890,7 +112993,6 @@ def index_filecloud_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -115939,8 +113041,7 @@ def index_filecloud_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -115998,10 +113099,8 @@ def index_filecloud_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -116055,7 +113154,6 @@ def index_filecloud_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -116100,7 +113198,6 @@ def _index_filecloud_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -116201,10 +113298,6 @@ def _index_filecloud_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -116286,8 +113379,7 @@ def index_filezilla_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -116345,10 +113437,8 @@ def index_filezilla_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -116402,7 +113492,6 @@ def index_filezilla_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -116451,8 +113540,7 @@ def index_filezilla_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -116510,10 +113598,8 @@ def index_filezilla_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -116567,7 +113653,6 @@ def index_filezilla_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -116616,8 +113701,7 @@ def index_filezilla_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -116675,10 +113759,8 @@ def index_filezilla_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -116732,7 +113814,6 @@ def index_filezilla_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -116777,7 +113858,6 @@ def _index_filezilla_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -116878,10 +113958,6 @@ def _index_filezilla_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -116963,8 +114039,7 @@ def index_flatt_security_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117022,10 +114097,8 @@ def index_flatt_security_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117079,7 +114152,6 @@ def index_flatt_security_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117128,8 +114200,7 @@ def index_flatt_security_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117187,10 +114258,8 @@ def index_flatt_security_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117244,7 +114313,6 @@ def index_flatt_security_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117293,8 +114361,7 @@ def index_flatt_security_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117352,10 +114419,8 @@ def index_flatt_security_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117409,7 +114474,6 @@ def index_flatt_security_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117454,7 +114518,6 @@ def _index_flatt_security_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -117555,10 +114618,6 @@ def _index_flatt_security_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -117640,8 +114699,7 @@ def index_forgerock_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117699,10 +114757,8 @@ def index_forgerock_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117756,7 +114812,6 @@ def index_forgerock_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117805,8 +114860,7 @@ def index_forgerock_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -117864,10 +114918,8 @@ def index_forgerock_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -117921,7 +114973,6 @@ def index_forgerock_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -117970,8 +115021,7 @@ def index_forgerock_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -118029,10 +115079,8 @@ def index_forgerock_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -118086,7 +115134,6 @@ def index_forgerock_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -118131,7 +115178,6 @@ def _index_forgerock_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -118232,10 +115278,6 @@ def _index_forgerock_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -118317,8 +115359,7 @@ def index_fortinet_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -118376,10 +115417,8 @@ def index_fortinet_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -118433,7 +115472,6 @@ def index_fortinet_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -118482,8 +115520,7 @@ def index_fortinet_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -118541,10 +115578,8 @@ def index_fortinet_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -118598,7 +115633,6 @@ def index_fortinet_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -118647,8 +115681,7 @@ def index_fortinet_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -118706,10 +115739,8 @@ def index_fortinet_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -118763,7 +115794,6 @@ def index_fortinet_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -118808,7 +115838,6 @@ def _index_fortinet_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -118909,10 +115938,6 @@ def _index_fortinet_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -118994,8 +116019,7 @@ def index_fortinet_ips_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119053,10 +116077,8 @@ def index_fortinet_ips_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119110,7 +116132,6 @@ def index_fortinet_ips_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -119159,8 +116180,7 @@ def index_fortinet_ips_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119218,10 +116238,8 @@ def index_fortinet_ips_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119275,7 +116293,6 @@ def index_fortinet_ips_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -119324,8 +116341,7 @@ def index_fortinet_ips_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119383,10 +116399,8 @@ def index_fortinet_ips_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119440,7 +116454,6 @@ def index_fortinet_ips_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -119485,7 +116498,6 @@ def _index_fortinet_ips_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -119586,10 +116598,6 @@ def _index_fortinet_ips_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -119671,8 +116679,7 @@ def index_foxit_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119730,10 +116737,8 @@ def index_foxit_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119787,7 +116792,6 @@ def index_foxit_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -119836,8 +116840,7 @@ def index_foxit_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -119895,10 +116898,8 @@ def index_foxit_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -119952,7 +116953,6 @@ def index_foxit_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120001,8 +117001,7 @@ def index_foxit_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -120060,10 +117059,8 @@ def index_foxit_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -120117,7 +117114,6 @@ def index_foxit_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120162,7 +117158,6 @@ def _index_foxit_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -120263,10 +117258,6 @@ def _index_foxit_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -120348,8 +117339,7 @@ def index_freebsd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -120407,10 +117397,8 @@ def index_freebsd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -120464,7 +117452,6 @@ def index_freebsd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120513,8 +117500,7 @@ def index_freebsd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -120572,10 +117558,8 @@ def index_freebsd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -120629,7 +117613,6 @@ def index_freebsd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120678,8 +117661,7 @@ def index_freebsd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -120737,10 +117719,8 @@ def index_freebsd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -120794,7 +117774,6 @@ def index_freebsd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -120839,7 +117818,6 @@ def _index_freebsd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -120940,10 +117918,6 @@ def _index_freebsd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -121025,8 +117999,7 @@ def index_fresenius_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121084,10 +118057,8 @@ def index_fresenius_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121141,7 +118112,6 @@ def index_fresenius_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -121190,8 +118160,7 @@ def index_fresenius_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121249,10 +118218,8 @@ def index_fresenius_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121306,7 +118273,6 @@ def index_fresenius_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -121355,8 +118321,7 @@ def index_fresenius_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121414,10 +118379,8 @@ def index_fresenius_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121471,7 +118434,6 @@ def index_fresenius_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -121516,7 +118478,6 @@ def _index_fresenius_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -121617,10 +118578,6 @@ def _index_fresenius_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -121702,8 +118659,7 @@ def index_gallagher_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121761,10 +118717,8 @@ def index_gallagher_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121818,7 +118772,6 @@ def index_gallagher_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -121867,8 +118820,7 @@ def index_gallagher_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -121926,10 +118878,8 @@ def index_gallagher_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -121983,7 +118933,6 @@ def index_gallagher_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122032,8 +118981,7 @@ def index_gallagher_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -122091,10 +119039,8 @@ def index_gallagher_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -122148,7 +119094,6 @@ def index_gallagher_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122193,7 +119138,6 @@ def _index_gallagher_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -122294,10 +119238,6 @@ def _index_gallagher_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -122379,8 +119319,7 @@ def index_gcp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -122438,10 +119377,8 @@ def index_gcp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -122495,7 +119432,6 @@ def index_gcp_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122544,8 +119480,7 @@ def index_gcp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -122603,10 +119538,8 @@ def index_gcp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -122660,7 +119593,6 @@ def index_gcp_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122709,8 +119641,7 @@ def index_gcp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -122768,10 +119699,8 @@ def index_gcp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -122825,7 +119754,6 @@ def index_gcp_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -122870,7 +119798,6 @@ def _index_gcp_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -122971,10 +119898,6 @@ def _index_gcp_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -123056,8 +119979,7 @@ def index_ge_gas_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123115,10 +120037,8 @@ def index_ge_gas_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -123172,7 +120092,6 @@ def index_ge_gas_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -123221,8 +120140,7 @@ def index_ge_gas_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123280,10 +120198,8 @@ def index_ge_gas_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -123337,7 +120253,6 @@ def index_ge_gas_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -123386,8 +120301,7 @@ def index_ge_gas_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123445,10 +120359,8 @@ def index_ge_gas_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -123502,7 +120414,6 @@ def index_ge_gas_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -123547,7 +120458,6 @@ def _index_ge_gas_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -123648,10 +120558,6 @@ def _index_ge_gas_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -123733,8 +120639,7 @@ def index_ge_healthcare_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123792,10 +120697,8 @@ def index_ge_healthcare_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -123849,7 +120752,6 @@ def index_ge_healthcare_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -123898,8 +120800,7 @@ def index_ge_healthcare_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -123957,10 +120858,8 @@ def index_ge_healthcare_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124014,7 +120913,6 @@ def index_ge_healthcare_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124063,8 +120961,7 @@ def index_ge_healthcare_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -124122,10 +121019,8 @@ def index_ge_healthcare_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124179,7 +121074,6 @@ def index_ge_healthcare_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124224,7 +121118,6 @@ def _index_ge_healthcare_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -124325,10 +121218,6 @@ def _index_ge_healthcare_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -124410,8 +121299,7 @@ def index_gem_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -124469,10 +121357,8 @@ def index_gem_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124526,7 +121412,6 @@ def index_gem_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124575,8 +121460,7 @@ def index_gem_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -124634,10 +121518,8 @@ def index_gem_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124691,7 +121573,6 @@ def index_gem_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124740,8 +121621,7 @@ def index_gem_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -124799,10 +121679,8 @@ def index_gem_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -124856,7 +121734,6 @@ def index_gem_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -124901,7 +121778,6 @@ def _index_gem_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -125002,10 +121878,6 @@ def _index_gem_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -125087,8 +121959,7 @@ def index_gen_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125146,10 +122017,8 @@ def index_gen_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -125203,7 +122072,6 @@ def index_gen_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -125252,8 +122120,7 @@ def index_gen_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125311,10 +122178,8 @@ def index_gen_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -125368,7 +122233,6 @@ def index_gen_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -125417,8 +122281,7 @@ def index_gen_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125476,10 +122339,8 @@ def index_gen_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -125533,7 +122394,6 @@ def index_gen_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -125578,7 +122438,6 @@ def _index_gen_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -125679,10 +122538,6 @@ def _index_gen_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -125764,8 +122619,7 @@ def index_genetec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125823,10 +122677,8 @@ def index_genetec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -125880,7 +122732,6 @@ def index_genetec_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -125929,8 +122780,7 @@ def index_genetec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -125988,10 +122838,8 @@ def index_genetec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126045,7 +122893,6 @@ def index_genetec_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126094,8 +122941,7 @@ def index_genetec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -126153,10 +122999,8 @@ def index_genetec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126210,7 +123054,6 @@ def index_genetec_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126255,7 +123098,6 @@ def _index_genetec_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -126356,10 +123198,6 @@ def _index_genetec_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -126441,8 +123279,7 @@ def index_ghsa_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -126500,10 +123337,8 @@ def index_ghsa_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126557,7 +123392,6 @@ def index_ghsa_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126606,8 +123440,7 @@ def index_ghsa_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -126665,10 +123498,8 @@ def index_ghsa_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126722,7 +123553,6 @@ def index_ghsa_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126771,8 +123601,7 @@ def index_ghsa_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -126830,10 +123659,8 @@ def index_ghsa_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -126887,7 +123714,6 @@ def index_ghsa_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -126932,7 +123758,6 @@ def _index_ghsa_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -127033,10 +123858,6 @@ def _index_ghsa_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -127118,8 +123939,7 @@ def index_gigabyte_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127177,10 +123997,8 @@ def index_gigabyte_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -127234,7 +124052,6 @@ def index_gigabyte_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -127283,8 +124100,7 @@ def index_gigabyte_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127342,10 +124158,8 @@ def index_gigabyte_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -127399,7 +124213,6 @@ def index_gigabyte_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -127448,8 +124261,7 @@ def index_gigabyte_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127507,10 +124319,8 @@ def index_gigabyte_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -127564,7 +124374,6 @@ def index_gigabyte_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -127609,7 +124418,6 @@ def _index_gigabyte_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -127710,10 +124518,6 @@ def _index_gigabyte_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -127795,8 +124599,7 @@ def index_gitee_exploits_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -127854,10 +124657,8 @@ def index_gitee_exploits_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -127911,7 +124712,6 @@ def index_gitee_exploits_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -127960,8 +124760,7 @@ def index_gitee_exploits_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128019,10 +124818,8 @@ def index_gitee_exploits_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128076,7 +124873,6 @@ def index_gitee_exploits_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128125,8 +124921,7 @@ def index_gitee_exploits_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128184,10 +124979,8 @@ def index_gitee_exploits_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128241,7 +125034,6 @@ def index_gitee_exploits_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128286,7 +125078,6 @@ def _index_gitee_exploits_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -128387,10 +125178,6 @@ def _index_gitee_exploits_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -128472,8 +125259,7 @@ def index_github_exploits_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128531,10 +125317,8 @@ def index_github_exploits_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128588,7 +125372,6 @@ def index_github_exploits_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128637,8 +125420,7 @@ def index_github_exploits_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128696,10 +125478,8 @@ def index_github_exploits_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128753,7 +125533,6 @@ def index_github_exploits_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128802,8 +125581,7 @@ def index_github_exploits_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -128861,10 +125639,8 @@ def index_github_exploits_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -128918,7 +125694,6 @@ def index_github_exploits_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -128963,7 +125738,6 @@ def _index_github_exploits_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -129064,10 +125838,6 @@ def _index_github_exploits_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -129149,8 +125919,7 @@ def index_github_security_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -129208,10 +125977,8 @@ def index_github_security_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -129265,7 +126032,6 @@ def index_github_security_advisories_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -129314,8 +126080,7 @@ def index_github_security_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -129373,10 +126138,8 @@ def index_github_security_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -129430,7 +126193,6 @@ def index_github_security_advisories_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -129479,8 +126241,7 @@ def index_github_security_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -129538,10 +126299,8 @@ def index_github_security_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -129595,7 +126354,6 @@ def index_github_security_advisories_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -129640,7 +126398,6 @@ def _index_github_security_advisories_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -129741,10 +126498,6 @@ def _index_github_security_advisories_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -129826,8 +126579,7 @@ def index_gitlab_advisories_community_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -129885,10 +126637,8 @@ def index_gitlab_advisories_community_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -129942,7 +126692,6 @@ def index_gitlab_advisories_community_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -129991,8 +126740,7 @@ def index_gitlab_advisories_community_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130050,10 +126798,8 @@ def index_gitlab_advisories_community_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130107,7 +126853,6 @@ def index_gitlab_advisories_community_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130156,8 +126901,7 @@ def index_gitlab_advisories_community_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130215,10 +126959,8 @@ def index_gitlab_advisories_community_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130272,7 +127014,6 @@ def index_gitlab_advisories_community_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130317,7 +127058,6 @@ def _index_gitlab_advisories_community_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -130418,10 +127158,6 @@ def _index_gitlab_advisories_community_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -130503,8 +127239,7 @@ def index_gitlab_exploits_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130562,10 +127297,8 @@ def index_gitlab_exploits_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130619,7 +127352,6 @@ def index_gitlab_exploits_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130668,8 +127400,7 @@ def index_gitlab_exploits_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130727,10 +127458,8 @@ def index_gitlab_exploits_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130784,7 +127513,6 @@ def index_gitlab_exploits_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130833,8 +127561,7 @@ def index_gitlab_exploits_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -130892,10 +127619,8 @@ def index_gitlab_exploits_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -130949,7 +127674,6 @@ def index_gitlab_exploits_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -130994,7 +127718,6 @@ def _index_gitlab_exploits_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -131095,10 +127818,6 @@ def _index_gitlab_exploits_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -131180,8 +127899,7 @@ def index_glibc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -131239,10 +127957,8 @@ def index_glibc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -131296,7 +128012,6 @@ def index_glibc_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -131345,8 +128060,7 @@ def index_glibc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -131404,10 +128118,8 @@ def index_glibc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -131461,7 +128173,6 @@ def index_glibc_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -131510,8 +128221,7 @@ def index_glibc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -131569,10 +128279,8 @@ def index_glibc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -131626,7 +128334,6 @@ def index_glibc_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -131671,7 +128378,6 @@ def _index_glibc_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -131772,10 +128478,6 @@ def _index_glibc_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -131857,8 +128559,7 @@ def index_gmo_cybersecurity_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -131916,10 +128617,8 @@ def index_gmo_cybersecurity_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -131973,7 +128672,6 @@ def index_gmo_cybersecurity_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132022,8 +128720,7 @@ def index_gmo_cybersecurity_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132081,10 +128778,8 @@ def index_gmo_cybersecurity_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132138,7 +128833,6 @@ def index_gmo_cybersecurity_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132187,8 +128881,7 @@ def index_gmo_cybersecurity_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132246,10 +128939,8 @@ def index_gmo_cybersecurity_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132303,7 +128994,6 @@ def index_gmo_cybersecurity_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132348,7 +129038,6 @@ def _index_gmo_cybersecurity_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -132449,10 +129138,6 @@ def _index_gmo_cybersecurity_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -132534,8 +129219,7 @@ def index_gnutls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132593,10 +129277,8 @@ def index_gnutls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132650,7 +129332,6 @@ def index_gnutls_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132699,8 +129380,7 @@ def index_gnutls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132758,10 +129438,8 @@ def index_gnutls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132815,7 +129493,6 @@ def index_gnutls_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -132864,8 +129541,7 @@ def index_gnutls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -132923,10 +129599,8 @@ def index_gnutls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -132980,7 +129654,6 @@ def index_gnutls_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -133025,7 +129698,6 @@ def _index_gnutls_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -133126,10 +129798,6 @@ def _index_gnutls_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -133211,8 +129879,7 @@ def index_go_vulndb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -133270,10 +129937,8 @@ def index_go_vulndb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -133327,7 +129992,6 @@ def index_go_vulndb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -133376,8 +130040,7 @@ def index_go_vulndb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -133435,10 +130098,8 @@ def index_go_vulndb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -133492,7 +130153,6 @@ def index_go_vulndb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -133541,8 +130201,7 @@ def index_go_vulndb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -133600,10 +130259,8 @@ def index_go_vulndb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -133657,7 +130314,6 @@ def index_go_vulndb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -133702,7 +130358,6 @@ def _index_go_vulndb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -133803,10 +130458,6 @@ def _index_go_vulndb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -133888,8 +130539,7 @@ def index_golang_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -133947,10 +130597,8 @@ def index_golang_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134004,7 +130652,6 @@ def index_golang_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134053,8 +130700,7 @@ def index_golang_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134112,10 +130758,8 @@ def index_golang_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134169,7 +130813,6 @@ def index_golang_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134218,8 +130861,7 @@ def index_golang_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134277,10 +130919,8 @@ def index_golang_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134334,7 +130974,6 @@ def index_golang_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134379,7 +131018,6 @@ def _index_golang_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -134480,10 +131118,6 @@ def _index_golang_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -134565,8 +131199,7 @@ def index_google0day_itw_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134624,10 +131257,8 @@ def index_google0day_itw_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134681,7 +131312,6 @@ def index_google0day_itw_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134730,8 +131360,7 @@ def index_google0day_itw_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134789,10 +131418,8 @@ def index_google0day_itw_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -134846,7 +131473,6 @@ def index_google0day_itw_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -134895,8 +131521,7 @@ def index_google0day_itw_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -134954,10 +131579,8 @@ def index_google0day_itw_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -135011,7 +131634,6 @@ def index_google0day_itw_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -135056,7 +131678,6 @@ def _index_google0day_itw_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -135157,10 +131778,6 @@ def _index_google0day_itw_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -135242,8 +131859,7 @@ def index_google_container_optimized_os_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -135301,10 +131917,8 @@ def index_google_container_optimized_os_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -135358,7 +131972,6 @@ def index_google_container_optimized_os_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -135407,8 +132020,7 @@ def index_google_container_optimized_os_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -135466,10 +132078,8 @@ def index_google_container_optimized_os_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -135523,7 +132133,6 @@ def index_google_container_optimized_os_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -135572,8 +132181,7 @@ def index_google_container_optimized_os_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -135631,10 +132239,8 @@ def index_google_container_optimized_os_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -135688,7 +132294,6 @@ def index_google_container_optimized_os_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -135733,7 +132338,6 @@ def _index_google_container_optimized_os_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -135834,10 +132438,6 @@ def _index_google_container_optimized_os_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -135919,8 +132519,7 @@ def index_grafana_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -135978,10 +132577,8 @@ def index_grafana_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136035,7 +132632,6 @@ def index_grafana_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136084,8 +132680,7 @@ def index_grafana_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136143,10 +132738,8 @@ def index_grafana_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136200,7 +132793,6 @@ def index_grafana_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136249,8 +132841,7 @@ def index_grafana_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136308,10 +132899,8 @@ def index_grafana_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136365,7 +132954,6 @@ def index_grafana_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136410,7 +132998,6 @@ def _index_grafana_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -136511,10 +133098,6 @@ def _index_grafana_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -136596,8 +133179,7 @@ def index_greynoise_metadata_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136655,10 +133237,8 @@ def index_greynoise_metadata_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136712,7 +133292,6 @@ def index_greynoise_metadata_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136761,8 +133340,7 @@ def index_greynoise_metadata_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136820,10 +133398,8 @@ def index_greynoise_metadata_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -136877,7 +133453,6 @@ def index_greynoise_metadata_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -136926,8 +133501,7 @@ def index_greynoise_metadata_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -136985,10 +133559,8 @@ def index_greynoise_metadata_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -137042,7 +133614,6 @@ def index_greynoise_metadata_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -137087,7 +133658,6 @@ def _index_greynoise_metadata_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -137188,10 +133758,6 @@ def _index_greynoise_metadata_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -137273,8 +133839,7 @@ def index_hackage_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -137332,10 +133897,8 @@ def index_hackage_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -137389,7 +133952,6 @@ def index_hackage_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -137438,8 +134000,7 @@ def index_hackage_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -137497,10 +134058,8 @@ def index_hackage_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -137554,7 +134113,6 @@ def index_hackage_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -137603,8 +134161,7 @@ def index_hackage_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -137662,10 +134219,8 @@ def index_hackage_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -137719,7 +134274,6 @@ def index_hackage_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -137764,7 +134318,6 @@ def _index_hackage_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -137865,10 +134418,6 @@ def _index_hackage_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -137950,8 +134499,7 @@ def index_hacktivity_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138009,10 +134557,8 @@ def index_hacktivity_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138066,7 +134612,6 @@ def index_hacktivity_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138115,8 +134660,7 @@ def index_hacktivity_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138174,10 +134718,8 @@ def index_hacktivity_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138231,7 +134773,6 @@ def index_hacktivity_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138280,8 +134821,7 @@ def index_hacktivity_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138339,10 +134879,8 @@ def index_hacktivity_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138396,7 +134934,6 @@ def index_hacktivity_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138441,7 +134978,6 @@ def _index_hacktivity_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -138542,10 +135078,6 @@ def _index_hacktivity_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -138627,8 +135159,7 @@ def index_harmonyos_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138686,10 +135217,8 @@ def index_harmonyos_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138743,7 +135272,6 @@ def index_harmonyos_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138792,8 +135320,7 @@ def index_harmonyos_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -138851,10 +135378,8 @@ def index_harmonyos_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -138908,7 +135433,6 @@ def index_harmonyos_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -138957,8 +135481,7 @@ def index_harmonyos_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -139016,10 +135539,8 @@ def index_harmonyos_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -139073,7 +135594,6 @@ def index_harmonyos_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -139118,7 +135638,6 @@ def _index_harmonyos_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -139219,10 +135738,6 @@ def _index_harmonyos_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -139304,8 +135819,7 @@ def index_hashicorp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -139363,10 +135877,8 @@ def index_hashicorp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -139420,7 +135932,6 @@ def index_hashicorp_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -139469,8 +135980,7 @@ def index_hashicorp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -139528,10 +136038,8 @@ def index_hashicorp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -139585,7 +136093,6 @@ def index_hashicorp_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -139634,8 +136141,7 @@ def index_hashicorp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -139693,10 +136199,8 @@ def index_hashicorp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -139750,7 +136254,6 @@ def index_hashicorp_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -139795,7 +136298,6 @@ def _index_hashicorp_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -139896,10 +136398,6 @@ def _index_hashicorp_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -139981,8 +136479,7 @@ def index_haskell_sadb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140040,10 +136537,8 @@ def index_haskell_sadb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140097,7 +136592,6 @@ def index_haskell_sadb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140146,8 +136640,7 @@ def index_haskell_sadb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140205,10 +136698,8 @@ def index_haskell_sadb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140262,7 +136753,6 @@ def index_haskell_sadb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140311,8 +136801,7 @@ def index_haskell_sadb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140370,10 +136859,8 @@ def index_haskell_sadb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140427,7 +136914,6 @@ def index_haskell_sadb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140472,7 +136958,6 @@ def _index_haskell_sadb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -140573,10 +137058,6 @@ def _index_haskell_sadb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -140658,8 +137139,7 @@ def index_hcl_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140717,10 +137197,8 @@ def index_hcl_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140774,7 +137252,6 @@ def index_hcl_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140823,8 +137300,7 @@ def index_hcl_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -140882,10 +137358,8 @@ def index_hcl_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -140939,7 +137413,6 @@ def index_hcl_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -140988,8 +137461,7 @@ def index_hcl_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -141047,10 +137519,8 @@ def index_hcl_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -141104,7 +137574,6 @@ def index_hcl_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -141149,7 +137618,6 @@ def _index_hcl_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -141250,10 +137718,6 @@ def _index_hcl_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -141335,8 +137799,7 @@ def index_hex_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -141394,10 +137857,8 @@ def index_hex_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -141451,7 +137912,6 @@ def index_hex_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -141500,8 +137960,7 @@ def index_hex_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -141559,10 +138018,8 @@ def index_hex_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -141616,7 +138073,6 @@ def index_hex_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -141665,8 +138121,7 @@ def index_hex_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -141724,10 +138179,8 @@ def index_hex_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -141781,7 +138234,6 @@ def index_hex_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -141826,7 +138278,6 @@ def _index_hex_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -141927,10 +138378,6 @@ def _index_hex_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -142012,8 +138459,7 @@ def index_hikvision_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142071,10 +138517,8 @@ def index_hikvision_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142128,7 +138572,6 @@ def index_hikvision_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -142177,8 +138620,7 @@ def index_hikvision_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142236,10 +138678,8 @@ def index_hikvision_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142293,7 +138733,6 @@ def index_hikvision_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -142342,8 +138781,7 @@ def index_hikvision_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142401,10 +138839,8 @@ def index_hikvision_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142458,7 +138894,6 @@ def index_hikvision_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -142503,7 +138938,6 @@ def _index_hikvision_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -142604,10 +139038,6 @@ def _index_hikvision_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -142689,8 +139119,7 @@ def index_hillrom_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142748,10 +139177,8 @@ def index_hillrom_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142805,7 +139232,6 @@ def index_hillrom_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -142854,8 +139280,7 @@ def index_hillrom_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -142913,10 +139338,8 @@ def index_hillrom_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -142970,7 +139393,6 @@ def index_hillrom_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143019,8 +139441,7 @@ def index_hillrom_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -143078,10 +139499,8 @@ def index_hillrom_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -143135,7 +139554,6 @@ def index_hillrom_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143180,7 +139598,6 @@ def _index_hillrom_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -143281,10 +139698,6 @@ def _index_hillrom_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -143366,8 +139779,7 @@ def index_hitachi_energy_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -143425,10 +139837,8 @@ def index_hitachi_energy_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -143482,7 +139892,6 @@ def index_hitachi_energy_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143531,8 +139940,7 @@ def index_hitachi_energy_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -143590,10 +139998,8 @@ def index_hitachi_energy_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -143647,7 +140053,6 @@ def index_hitachi_energy_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143696,8 +140101,7 @@ def index_hitachi_energy_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -143755,10 +140159,8 @@ def index_hitachi_energy_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -143812,7 +140214,6 @@ def index_hitachi_energy_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -143857,7 +140258,6 @@ def _index_hitachi_energy_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -143958,10 +140358,6 @@ def _index_hitachi_energy_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -144043,8 +140439,7 @@ def index_hitachi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144102,10 +140497,8 @@ def index_hitachi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -144159,7 +140552,6 @@ def index_hitachi_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -144208,8 +140600,7 @@ def index_hitachi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144267,10 +140658,8 @@ def index_hitachi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -144324,7 +140713,6 @@ def index_hitachi_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -144373,8 +140761,7 @@ def index_hitachi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144432,10 +140819,8 @@ def index_hitachi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -144489,7 +140874,6 @@ def index_hitachi_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -144534,7 +140918,6 @@ def _index_hitachi_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -144635,10 +141018,6 @@ def _index_hitachi_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -144720,8 +141099,7 @@ def index_hkcert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144779,10 +141157,8 @@ def index_hkcert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -144836,7 +141212,6 @@ def index_hkcert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -144885,8 +141260,7 @@ def index_hkcert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -144944,10 +141318,8 @@ def index_hkcert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145001,7 +141373,6 @@ def index_hkcert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145050,8 +141421,7 @@ def index_hkcert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -145109,10 +141479,8 @@ def index_hkcert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145166,7 +141534,6 @@ def index_hkcert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145211,7 +141578,6 @@ def _index_hkcert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -145312,10 +141678,6 @@ def _index_hkcert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -145397,8 +141759,7 @@ def index_hms_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -145456,10 +141817,8 @@ def index_hms_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145513,7 +141872,6 @@ def index_hms_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145562,8 +141920,7 @@ def index_hms_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -145621,10 +141978,8 @@ def index_hms_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145678,7 +142033,6 @@ def index_hms_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145727,8 +142081,7 @@ def index_hms_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -145786,10 +142139,8 @@ def index_hms_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -145843,7 +142194,6 @@ def index_hms_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -145888,7 +142238,6 @@ def _index_hms_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -145989,10 +142338,6 @@ def _index_hms_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -146074,8 +142419,7 @@ def index_honeywell_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146133,10 +142477,8 @@ def index_honeywell_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -146190,7 +142532,6 @@ def index_honeywell_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -146239,8 +142580,7 @@ def index_honeywell_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146298,10 +142638,8 @@ def index_honeywell_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -146355,7 +142693,6 @@ def index_honeywell_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -146404,8 +142741,7 @@ def index_honeywell_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146463,10 +142799,8 @@ def index_honeywell_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -146520,7 +142854,6 @@ def index_honeywell_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -146565,7 +142898,6 @@ def _index_honeywell_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -146666,10 +142998,6 @@ def _index_honeywell_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -146751,8 +143079,7 @@ def index_hp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146810,10 +143137,8 @@ def index_hp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -146867,7 +143192,6 @@ def index_hp_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -146916,8 +143240,7 @@ def index_hp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -146975,10 +143298,8 @@ def index_hp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147032,7 +143353,6 @@ def index_hp_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147081,8 +143401,7 @@ def index_hp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -147140,10 +143459,8 @@ def index_hp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147197,7 +143514,6 @@ def index_hp_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147242,7 +143558,6 @@ def _index_hp_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -147343,10 +143658,6 @@ def _index_hp_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -147428,8 +143739,7 @@ def index_hpe_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -147487,10 +143797,8 @@ def index_hpe_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147544,7 +143852,6 @@ def index_hpe_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147593,8 +143900,7 @@ def index_hpe_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -147652,10 +143958,8 @@ def index_hpe_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147709,7 +144013,6 @@ def index_hpe_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147758,8 +144061,7 @@ def index_hpe_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -147817,10 +144119,8 @@ def index_hpe_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -147874,7 +144174,6 @@ def index_hpe_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -147919,7 +144218,6 @@ def _index_hpe_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -148020,10 +144318,6 @@ def _index_hpe_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -148105,8 +144399,7 @@ def index_huawei_euleros_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148164,10 +144457,8 @@ def index_huawei_euleros_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -148221,7 +144512,6 @@ def index_huawei_euleros_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -148270,8 +144560,7 @@ def index_huawei_euleros_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148329,10 +144618,8 @@ def index_huawei_euleros_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -148386,7 +144673,6 @@ def index_huawei_euleros_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -148435,8 +144721,7 @@ def index_huawei_euleros_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148494,10 +144779,8 @@ def index_huawei_euleros_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -148551,7 +144834,6 @@ def index_huawei_euleros_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -148596,7 +144878,6 @@ def _index_huawei_euleros_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -148697,10 +144978,6 @@ def _index_huawei_euleros_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -148782,8 +145059,7 @@ def index_huawei_ips_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -148841,10 +145117,8 @@ def index_huawei_ips_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -148898,7 +145172,6 @@ def index_huawei_ips_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -148947,8 +145220,7 @@ def index_huawei_ips_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149006,10 +145278,8 @@ def index_huawei_ips_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149063,7 +145333,6 @@ def index_huawei_ips_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149112,8 +145381,7 @@ def index_huawei_ips_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149171,10 +145439,8 @@ def index_huawei_ips_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149228,7 +145494,6 @@ def index_huawei_ips_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149273,7 +145538,6 @@ def _index_huawei_ips_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -149374,10 +145638,6 @@ def _index_huawei_ips_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -149459,8 +145719,7 @@ def index_huawei_psirt_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149518,10 +145777,8 @@ def index_huawei_psirt_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149575,7 +145832,6 @@ def index_huawei_psirt_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149624,8 +145880,7 @@ def index_huawei_psirt_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149683,10 +145938,8 @@ def index_huawei_psirt_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149740,7 +145993,6 @@ def index_huawei_psirt_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149789,8 +146041,7 @@ def index_huawei_psirt_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -149848,10 +146099,8 @@ def index_huawei_psirt_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -149905,7 +146154,6 @@ def index_huawei_psirt_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -149950,7 +146198,6 @@ def _index_huawei_psirt_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -150051,10 +146298,6 @@ def _index_huawei_psirt_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -150136,8 +146379,7 @@ def index_iava_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150195,10 +146437,8 @@ def index_iava_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -150252,7 +146492,6 @@ def index_iava_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -150301,8 +146540,7 @@ def index_iava_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150360,10 +146598,8 @@ def index_iava_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -150417,7 +146653,6 @@ def index_iava_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -150466,8 +146701,7 @@ def index_iava_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150525,10 +146759,8 @@ def index_iava_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -150582,7 +146814,6 @@ def index_iava_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -150627,7 +146858,6 @@ def _index_iava_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -150728,10 +146958,6 @@ def _index_iava_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -150813,8 +147039,7 @@ def index_ibm_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -150872,10 +147097,8 @@ def index_ibm_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -150929,7 +147152,6 @@ def index_ibm_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -150978,8 +147200,7 @@ def index_ibm_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151037,10 +147258,8 @@ def index_ibm_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151094,7 +147313,6 @@ def index_ibm_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151143,8 +147361,7 @@ def index_ibm_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151202,10 +147419,8 @@ def index_ibm_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151259,7 +147474,6 @@ def index_ibm_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151304,7 +147518,6 @@ def _index_ibm_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -151405,10 +147618,6 @@ def _index_ibm_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -151490,8 +147699,7 @@ def index_idemia_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151549,10 +147757,8 @@ def index_idemia_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151606,7 +147812,6 @@ def index_idemia_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151655,8 +147860,7 @@ def index_idemia_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151714,10 +147918,8 @@ def index_idemia_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151771,7 +147973,6 @@ def index_idemia_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151820,8 +148021,7 @@ def index_idemia_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -151879,10 +148079,8 @@ def index_idemia_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -151936,7 +148134,6 @@ def index_idemia_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -151981,7 +148178,6 @@ def _index_idemia_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -152082,10 +148278,6 @@ def _index_idemia_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -152167,8 +148359,7 @@ def index_igel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -152226,10 +148417,8 @@ def index_igel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -152283,7 +148472,6 @@ def index_igel_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -152332,8 +148520,7 @@ def index_igel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -152391,10 +148578,8 @@ def index_igel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -152448,7 +148633,6 @@ def index_igel_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -152497,8 +148681,7 @@ def index_igel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -152556,10 +148739,8 @@ def index_igel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -152613,7 +148794,6 @@ def index_igel_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -152658,7 +148838,6 @@ def _index_igel_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -152759,10 +148938,6 @@ def _index_igel_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -152844,8 +149019,7 @@ def index_il_alerts_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -152903,10 +149077,8 @@ def index_il_alerts_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -152960,7 +149132,6 @@ def index_il_alerts_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153009,8 +149180,7 @@ def index_il_alerts_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153068,10 +149238,8 @@ def index_il_alerts_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153125,7 +149293,6 @@ def index_il_alerts_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153174,8 +149341,7 @@ def index_il_alerts_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153233,10 +149399,8 @@ def index_il_alerts_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153290,7 +149454,6 @@ def index_il_alerts_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153335,7 +149498,6 @@ def _index_il_alerts_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -153436,10 +149598,6 @@ def _index_il_alerts_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -153521,8 +149679,7 @@ def index_il_vulnerabilities_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153580,10 +149737,8 @@ def index_il_vulnerabilities_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153637,7 +149792,6 @@ def index_il_vulnerabilities_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153686,8 +149840,7 @@ def index_il_vulnerabilities_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153745,10 +149898,8 @@ def index_il_vulnerabilities_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153802,7 +149953,6 @@ def index_il_vulnerabilities_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -153851,8 +150001,7 @@ def index_il_vulnerabilities_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -153910,10 +150059,8 @@ def index_il_vulnerabilities_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -153967,7 +150114,6 @@ def index_il_vulnerabilities_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -154012,7 +150158,6 @@ def _index_il_vulnerabilities_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -154113,10 +150258,6 @@ def _index_il_vulnerabilities_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -154198,8 +150339,7 @@ def index_incibe_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -154257,10 +150397,8 @@ def index_incibe_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -154314,7 +150452,6 @@ def index_incibe_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -154363,8 +150500,7 @@ def index_incibe_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -154422,10 +150558,8 @@ def index_incibe_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -154479,7 +150613,6 @@ def index_incibe_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -154528,8 +150661,7 @@ def index_incibe_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -154587,10 +150719,8 @@ def index_incibe_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -154644,7 +150774,6 @@ def index_incibe_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -154689,7 +150818,6 @@ def _index_incibe_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -154790,10 +150918,6 @@ def _index_incibe_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -154875,8 +150999,7 @@ def index_initial_access_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -154934,10 +151057,8 @@ def index_initial_access_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -154991,7 +151112,6 @@ def index_initial_access_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155040,8 +151160,7 @@ def index_initial_access_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155099,10 +151218,8 @@ def index_initial_access_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155156,7 +151273,6 @@ def index_initial_access_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155205,8 +151321,7 @@ def index_initial_access_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155264,10 +151379,8 @@ def index_initial_access_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155321,7 +151434,6 @@ def index_initial_access_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155366,7 +151478,6 @@ def _index_initial_access_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -155467,10 +151578,6 @@ def _index_initial_access_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -155552,8 +151659,7 @@ def index_initial_access_git_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155611,10 +151717,8 @@ def index_initial_access_git_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155668,7 +151772,6 @@ def index_initial_access_git_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155717,8 +151820,7 @@ def index_initial_access_git_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155776,10 +151878,8 @@ def index_initial_access_git_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155833,7 +151933,6 @@ def index_initial_access_git_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -155882,8 +151981,7 @@ def index_initial_access_git_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -155941,10 +152039,8 @@ def index_initial_access_git_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -155998,7 +152094,6 @@ def index_initial_access_git_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -156043,7 +152138,6 @@ def _index_initial_access_git_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -156144,10 +152238,6 @@ def _index_initial_access_git_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -156229,8 +152319,7 @@ def index_intel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -156288,10 +152377,8 @@ def index_intel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -156345,7 +152432,6 @@ def index_intel_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -156394,8 +152480,7 @@ def index_intel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -156453,10 +152538,8 @@ def index_intel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -156510,7 +152593,6 @@ def index_intel_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -156559,8 +152641,7 @@ def index_intel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -156618,10 +152699,8 @@ def index_intel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -156675,7 +152754,6 @@ def index_intel_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -156720,7 +152798,6 @@ def _index_intel_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -156821,10 +152898,6 @@ def _index_intel_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -156911,8 +152984,7 @@ def index_ipintel10d_get( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -156980,10 +153052,8 @@ def index_ipintel10d_get( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157042,7 +153112,6 @@ def index_ipintel10d_get( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -157096,8 +153165,7 @@ def index_ipintel10d_get_with_http_info( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -157165,10 +153233,8 @@ def index_ipintel10d_get_with_http_info( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157227,7 +153293,6 @@ def index_ipintel10d_get_with_http_info( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -157281,8 +153346,7 @@ def index_ipintel10d_get_without_preload_content( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -157350,10 +153414,8 @@ def index_ipintel10d_get_without_preload_content( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157412,7 +153474,6 @@ def index_ipintel10d_get_without_preload_content( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -157462,7 +153523,6 @@ def _index_ipintel10d_get_serialize( hostname, matches, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -157583,10 +153643,6 @@ def _index_ipintel10d_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -157673,8 +153729,7 @@ def index_ipintel30d_get( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -157742,10 +153797,8 @@ def index_ipintel30d_get( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157804,7 +153857,6 @@ def index_ipintel30d_get( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -157858,8 +153910,7 @@ def index_ipintel30d_get_with_http_info( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -157927,10 +153978,8 @@ def index_ipintel30d_get_with_http_info( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -157989,7 +154038,6 @@ def index_ipintel30d_get_with_http_info( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158043,8 +154091,7 @@ def index_ipintel30d_get_without_preload_content( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -158112,10 +154159,8 @@ def index_ipintel30d_get_without_preload_content( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -158174,7 +154219,6 @@ def index_ipintel30d_get_without_preload_content( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158224,7 +154268,6 @@ def _index_ipintel30d_get_serialize( hostname, matches, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -158345,10 +154388,6 @@ def _index_ipintel30d_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -158435,8 +154474,7 @@ def index_ipintel3d_get( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -158504,10 +154542,8 @@ def index_ipintel3d_get( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -158566,7 +154602,6 @@ def index_ipintel3d_get( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158620,8 +154655,7 @@ def index_ipintel3d_get_with_http_info( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -158689,10 +154723,8 @@ def index_ipintel3d_get_with_http_info( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -158751,7 +154783,6 @@ def index_ipintel3d_get_with_http_info( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158805,8 +154836,7 @@ def index_ipintel3d_get_without_preload_content( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -158874,10 +154904,8 @@ def index_ipintel3d_get_without_preload_content( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -158936,7 +154964,6 @@ def index_ipintel3d_get_without_preload_content( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -158986,7 +155013,6 @@ def _index_ipintel3d_get_serialize( hostname, matches, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -159107,10 +155133,6 @@ def _index_ipintel3d_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -159197,8 +155219,7 @@ def index_ipintel90d_get( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -159266,10 +155287,8 @@ def index_ipintel90d_get( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -159328,7 +155347,6 @@ def index_ipintel90d_get( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -159382,8 +155400,7 @@ def index_ipintel90d_get_with_http_info( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -159451,10 +155468,8 @@ def index_ipintel90d_get_with_http_info( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -159513,7 +155528,6 @@ def index_ipintel90d_get_with_http_info( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -159567,8 +155581,7 @@ def index_ipintel90d_get_without_preload_content( kind: Annotated[Optional[StrictStr], Field(description="Kind of IpIntel Finding")] = None, hostname: Annotated[Optional[StrictStr], Field(description="Match a string in the list of hostnames")] = None, matches: Annotated[Optional[StrictStr], Field(description="Search for a string in the field describing the finding")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -159636,10 +155649,8 @@ def index_ipintel90d_get_without_preload_content( :type hostname: str :param matches: Search for a string in the field describing the finding :type matches: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -159698,7 +155709,6 @@ def index_ipintel90d_get_without_preload_content( hostname=hostname, matches=matches, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -159748,7 +155758,6 @@ def _index_ipintel90d_get_serialize( hostname, matches, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -159869,10 +155878,6 @@ def _index_ipintel90d_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -159954,8 +155959,7 @@ def index_istio_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160013,10 +156017,8 @@ def index_istio_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160070,7 +156072,6 @@ def index_istio_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160119,8 +156120,7 @@ def index_istio_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160178,10 +156178,8 @@ def index_istio_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160235,7 +156233,6 @@ def index_istio_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160284,8 +156281,7 @@ def index_istio_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160343,10 +156339,8 @@ def index_istio_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160400,7 +156394,6 @@ def index_istio_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160445,7 +156438,6 @@ def _index_istio_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -160546,10 +156538,6 @@ def _index_istio_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -160631,8 +156619,7 @@ def index_ivanti_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160690,10 +156677,8 @@ def index_ivanti_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160747,7 +156732,6 @@ def index_ivanti_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160796,8 +156780,7 @@ def index_ivanti_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -160855,10 +156838,8 @@ def index_ivanti_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -160912,7 +156893,6 @@ def index_ivanti_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -160961,8 +156941,7 @@ def index_ivanti_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -161020,10 +156999,8 @@ def index_ivanti_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -161077,7 +157054,6 @@ def index_ivanti_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -161122,7 +157098,6 @@ def _index_ivanti_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -161223,10 +157198,6 @@ def _index_ivanti_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -161308,8 +157279,7 @@ def index_ivanti_rss_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -161367,10 +157337,8 @@ def index_ivanti_rss_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -161424,7 +157392,6 @@ def index_ivanti_rss_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -161473,8 +157440,7 @@ def index_ivanti_rss_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -161532,10 +157498,8 @@ def index_ivanti_rss_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -161589,7 +157553,6 @@ def index_ivanti_rss_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -161638,8 +157601,7 @@ def index_ivanti_rss_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -161697,10 +157659,8 @@ def index_ivanti_rss_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -161754,7 +157714,6 @@ def index_ivanti_rss_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -161799,7 +157758,6 @@ def _index_ivanti_rss_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -161900,10 +157858,6 @@ def _index_ivanti_rss_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -161985,8 +157939,7 @@ def index_jenkins_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162044,10 +157997,8 @@ def index_jenkins_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162101,7 +158052,6 @@ def index_jenkins_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162150,8 +158100,7 @@ def index_jenkins_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162209,10 +158158,8 @@ def index_jenkins_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162266,7 +158213,6 @@ def index_jenkins_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162315,8 +158261,7 @@ def index_jenkins_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162374,10 +158319,8 @@ def index_jenkins_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162431,7 +158374,6 @@ def index_jenkins_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162476,7 +158418,6 @@ def _index_jenkins_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -162577,10 +158518,6 @@ def _index_jenkins_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -162662,8 +158599,7 @@ def index_jetbrains_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162721,10 +158657,8 @@ def index_jetbrains_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162778,7 +158712,6 @@ def index_jetbrains_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162827,8 +158760,7 @@ def index_jetbrains_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -162886,10 +158818,8 @@ def index_jetbrains_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -162943,7 +158873,6 @@ def index_jetbrains_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -162992,8 +158921,7 @@ def index_jetbrains_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -163051,10 +158979,8 @@ def index_jetbrains_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -163108,7 +159034,6 @@ def index_jetbrains_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -163153,7 +159078,6 @@ def _index_jetbrains_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -163254,10 +159178,6 @@ def _index_jetbrains_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -163339,8 +159259,7 @@ def index_jfrog_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -163398,10 +159317,8 @@ def index_jfrog_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -163455,7 +159372,6 @@ def index_jfrog_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -163504,8 +159420,7 @@ def index_jfrog_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -163563,10 +159478,8 @@ def index_jfrog_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -163620,7 +159533,6 @@ def index_jfrog_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -163669,8 +159581,7 @@ def index_jfrog_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -163728,10 +159639,8 @@ def index_jfrog_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -163785,7 +159694,6 @@ def index_jfrog_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -163830,7 +159738,6 @@ def _index_jfrog_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -163931,10 +159838,6 @@ def _index_jfrog_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -164016,8 +159919,7 @@ def index_jnj_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164075,10 +159977,8 @@ def index_jnj_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164132,7 +160032,6 @@ def index_jnj_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -164181,8 +160080,7 @@ def index_jnj_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164240,10 +160138,8 @@ def index_jnj_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164297,7 +160193,6 @@ def index_jnj_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -164346,8 +160241,7 @@ def index_jnj_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164405,10 +160299,8 @@ def index_jnj_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164462,7 +160354,6 @@ def index_jnj_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -164507,7 +160398,6 @@ def _index_jnj_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -164608,10 +160498,6 @@ def _index_jnj_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -164693,8 +160579,7 @@ def index_johnson_controls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164752,10 +160637,8 @@ def index_johnson_controls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164809,7 +160692,6 @@ def index_johnson_controls_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -164858,8 +160740,7 @@ def index_johnson_controls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -164917,10 +160798,8 @@ def index_johnson_controls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -164974,7 +160853,6 @@ def index_johnson_controls_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165023,8 +160901,7 @@ def index_johnson_controls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -165082,10 +160959,8 @@ def index_johnson_controls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -165139,7 +161014,6 @@ def index_johnson_controls_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165184,7 +161058,6 @@ def _index_johnson_controls_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -165285,10 +161158,6 @@ def _index_johnson_controls_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -165370,8 +161239,7 @@ def index_juniper_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -165429,10 +161297,8 @@ def index_juniper_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -165486,7 +161352,6 @@ def index_juniper_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165535,8 +161400,7 @@ def index_juniper_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -165594,10 +161458,8 @@ def index_juniper_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -165651,7 +161513,6 @@ def index_juniper_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165700,8 +161561,7 @@ def index_juniper_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -165759,10 +161619,8 @@ def index_juniper_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -165816,7 +161674,6 @@ def index_juniper_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -165861,7 +161718,6 @@ def _index_juniper_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -165962,10 +161818,6 @@ def _index_juniper_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -166047,8 +161899,7 @@ def index_jvn_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166106,10 +161957,8 @@ def index_jvn_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -166163,7 +162012,6 @@ def index_jvn_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -166212,8 +162060,7 @@ def index_jvn_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166271,10 +162118,8 @@ def index_jvn_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -166328,7 +162173,6 @@ def index_jvn_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -166377,8 +162221,7 @@ def index_jvn_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166436,10 +162279,8 @@ def index_jvn_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -166493,7 +162334,6 @@ def index_jvn_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -166538,7 +162378,6 @@ def _index_jvn_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -166639,10 +162478,6 @@ def _index_jvn_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -166724,8 +162559,7 @@ def index_jvndb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166783,10 +162617,8 @@ def index_jvndb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -166840,7 +162672,6 @@ def index_jvndb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -166889,8 +162720,7 @@ def index_jvndb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -166948,10 +162778,8 @@ def index_jvndb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167005,7 +162833,6 @@ def index_jvndb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167054,8 +162881,7 @@ def index_jvndb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -167113,10 +162939,8 @@ def index_jvndb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167170,7 +162994,6 @@ def index_jvndb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167215,7 +163038,6 @@ def _index_jvndb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -167316,10 +163138,6 @@ def _index_jvndb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -167401,8 +163219,7 @@ def index_kaspersky_ics_cert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -167460,10 +163277,8 @@ def index_kaspersky_ics_cert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167517,7 +163332,6 @@ def index_kaspersky_ics_cert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167566,8 +163380,7 @@ def index_kaspersky_ics_cert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -167625,10 +163438,8 @@ def index_kaspersky_ics_cert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167682,7 +163493,6 @@ def index_kaspersky_ics_cert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167731,8 +163541,7 @@ def index_kaspersky_ics_cert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -167790,10 +163599,8 @@ def index_kaspersky_ics_cert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -167847,7 +163654,6 @@ def index_kaspersky_ics_cert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -167892,7 +163698,6 @@ def _index_kaspersky_ics_cert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -167993,10 +163798,6 @@ def _index_kaspersky_ics_cert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -168078,8 +163879,7 @@ def index_korelogic_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168137,10 +163937,8 @@ def index_korelogic_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -168194,7 +163992,6 @@ def index_korelogic_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -168243,8 +164040,7 @@ def index_korelogic_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168302,10 +164098,8 @@ def index_korelogic_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -168359,7 +164153,6 @@ def index_korelogic_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -168408,8 +164201,7 @@ def index_korelogic_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168467,10 +164259,8 @@ def index_korelogic_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -168524,7 +164314,6 @@ def index_korelogic_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -168569,7 +164358,6 @@ def _index_korelogic_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -168670,10 +164458,6 @@ def _index_korelogic_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -168755,8 +164539,7 @@ def index_krcert_security_notices_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168814,10 +164597,8 @@ def index_krcert_security_notices_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -168871,7 +164652,6 @@ def index_krcert_security_notices_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -168920,8 +164700,7 @@ def index_krcert_security_notices_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -168979,10 +164758,8 @@ def index_krcert_security_notices_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169036,7 +164813,6 @@ def index_krcert_security_notices_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169085,8 +164861,7 @@ def index_krcert_security_notices_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -169144,10 +164919,8 @@ def index_krcert_security_notices_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169201,7 +164974,6 @@ def index_krcert_security_notices_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169246,7 +165018,6 @@ def _index_krcert_security_notices_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -169347,10 +165118,6 @@ def _index_krcert_security_notices_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -169432,8 +165199,7 @@ def index_krcert_vulnerabilities_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -169491,10 +165257,8 @@ def index_krcert_vulnerabilities_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169548,7 +165312,6 @@ def index_krcert_vulnerabilities_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169597,8 +165360,7 @@ def index_krcert_vulnerabilities_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -169656,10 +165418,8 @@ def index_krcert_vulnerabilities_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169713,7 +165473,6 @@ def index_krcert_vulnerabilities_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169762,8 +165521,7 @@ def index_krcert_vulnerabilities_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -169821,10 +165579,8 @@ def index_krcert_vulnerabilities_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -169878,7 +165634,6 @@ def index_krcert_vulnerabilities_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -169923,7 +165678,6 @@ def _index_krcert_vulnerabilities_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -170024,10 +165778,6 @@ def _index_krcert_vulnerabilities_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -170109,8 +165859,7 @@ def index_kubernetes_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170168,10 +165917,8 @@ def index_kubernetes_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -170225,7 +165972,6 @@ def index_kubernetes_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -170274,8 +166020,7 @@ def index_kubernetes_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170333,10 +166078,8 @@ def index_kubernetes_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -170390,7 +166133,6 @@ def index_kubernetes_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -170439,8 +166181,7 @@ def index_kubernetes_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170498,10 +166239,8 @@ def index_kubernetes_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -170555,7 +166294,6 @@ def index_kubernetes_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -170600,7 +166338,6 @@ def _index_kubernetes_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -170701,10 +166438,6 @@ def _index_kubernetes_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -170786,8 +166519,7 @@ def index_kunbus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -170845,10 +166577,8 @@ def index_kunbus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -170902,7 +166632,6 @@ def index_kunbus_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -170951,8 +166680,7 @@ def index_kunbus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171010,10 +166738,8 @@ def index_kunbus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171067,7 +166793,6 @@ def index_kunbus_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171116,8 +166841,7 @@ def index_kunbus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171175,10 +166899,8 @@ def index_kunbus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171232,7 +166954,6 @@ def index_kunbus_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171277,7 +166998,6 @@ def _index_kunbus_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -171378,10 +167098,6 @@ def _index_kunbus_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -171463,8 +167179,7 @@ def index_lantronix_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171522,10 +167237,8 @@ def index_lantronix_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171579,7 +167292,6 @@ def index_lantronix_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171628,8 +167340,7 @@ def index_lantronix_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171687,10 +167398,8 @@ def index_lantronix_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171744,7 +167453,6 @@ def index_lantronix_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171793,8 +167501,7 @@ def index_lantronix_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -171852,10 +167559,8 @@ def index_lantronix_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -171909,7 +167614,6 @@ def index_lantronix_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -171954,7 +167658,6 @@ def _index_lantronix_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -172055,10 +167758,6 @@ def _index_lantronix_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -172140,8 +167839,7 @@ def index_lenovo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -172199,10 +167897,8 @@ def index_lenovo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -172256,7 +167952,6 @@ def index_lenovo_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -172305,8 +168000,7 @@ def index_lenovo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -172364,10 +168058,8 @@ def index_lenovo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -172421,7 +168113,6 @@ def index_lenovo_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -172470,8 +168161,7 @@ def index_lenovo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -172529,10 +168219,8 @@ def index_lenovo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -172586,7 +168274,6 @@ def index_lenovo_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -172631,7 +168318,6 @@ def _index_lenovo_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -172732,10 +168418,6 @@ def _index_lenovo_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -172817,8 +168499,7 @@ def index_lexmark_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -172876,10 +168557,8 @@ def index_lexmark_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -172933,7 +168612,6 @@ def index_lexmark_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -172982,8 +168660,7 @@ def index_lexmark_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173041,10 +168718,8 @@ def index_lexmark_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173098,7 +168773,6 @@ def index_lexmark_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173147,8 +168821,7 @@ def index_lexmark_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173206,10 +168879,8 @@ def index_lexmark_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173263,7 +168934,6 @@ def index_lexmark_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173308,7 +168978,6 @@ def _index_lexmark_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -173409,10 +169078,6 @@ def _index_lexmark_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -173494,8 +169159,7 @@ def index_lg_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173553,10 +169217,8 @@ def index_lg_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173610,7 +169272,6 @@ def index_lg_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173659,8 +169320,7 @@ def index_lg_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173718,10 +169378,8 @@ def index_lg_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173775,7 +169433,6 @@ def index_lg_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173824,8 +169481,7 @@ def index_lg_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -173883,10 +169539,8 @@ def index_lg_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -173940,7 +169594,6 @@ def index_lg_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -173985,7 +169638,6 @@ def _index_lg_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -174086,10 +169738,6 @@ def _index_lg_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -174171,8 +169819,7 @@ def index_libre_office_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -174230,10 +169877,8 @@ def index_libre_office_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -174287,7 +169932,6 @@ def index_libre_office_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -174336,8 +169980,7 @@ def index_libre_office_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -174395,10 +170038,8 @@ def index_libre_office_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -174452,7 +170093,6 @@ def index_libre_office_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -174501,8 +170141,7 @@ def index_libre_office_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -174560,10 +170199,8 @@ def index_libre_office_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -174617,7 +170254,6 @@ def index_libre_office_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -174662,7 +170298,6 @@ def _index_libre_office_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -174763,10 +170398,6 @@ def _index_libre_office_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -174848,8 +170479,7 @@ def index_linux_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -174907,10 +170537,8 @@ def index_linux_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -174964,7 +170592,6 @@ def index_linux_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175013,8 +170640,7 @@ def index_linux_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175072,10 +170698,8 @@ def index_linux_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175129,7 +170753,6 @@ def index_linux_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175178,8 +170801,7 @@ def index_linux_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175237,10 +170859,8 @@ def index_linux_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175294,7 +170914,6 @@ def index_linux_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175339,7 +170958,6 @@ def _index_linux_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -175440,10 +171058,6 @@ def _index_linux_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -175525,8 +171139,7 @@ def index_lol_advs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175584,10 +171197,8 @@ def index_lol_advs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175641,7 +171252,6 @@ def index_lol_advs_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175690,8 +171300,7 @@ def index_lol_advs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175749,10 +171358,8 @@ def index_lol_advs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175806,7 +171413,6 @@ def index_lol_advs_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -175855,8 +171461,7 @@ def index_lol_advs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -175914,10 +171519,8 @@ def index_lol_advs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -175971,7 +171574,6 @@ def index_lol_advs_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -176016,7 +171618,6 @@ def _index_lol_advs_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -176117,10 +171718,6 @@ def _index_lol_advs_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -176202,8 +171799,7 @@ def index_m_files_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -176261,10 +171857,8 @@ def index_m_files_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -176318,7 +171912,6 @@ def index_m_files_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -176367,8 +171960,7 @@ def index_m_files_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -176426,10 +172018,8 @@ def index_m_files_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -176483,7 +172073,6 @@ def index_m_files_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -176532,8 +172121,7 @@ def index_m_files_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -176591,10 +172179,8 @@ def index_m_files_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -176648,7 +172234,6 @@ def index_m_files_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -176693,7 +172278,6 @@ def _index_m_files_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -176794,10 +172378,6 @@ def _index_m_files_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -176879,8 +172459,7 @@ def index_macert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -176938,10 +172517,8 @@ def index_macert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -176995,7 +172572,6 @@ def index_macert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177044,8 +172620,7 @@ def index_macert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177103,10 +172678,8 @@ def index_macert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -177160,7 +172733,6 @@ def index_macert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177209,8 +172781,7 @@ def index_macert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177268,10 +172839,8 @@ def index_macert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -177325,7 +172894,6 @@ def index_macert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177370,7 +172938,6 @@ def _index_macert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -177471,10 +173038,6 @@ def _index_macert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -177556,8 +173119,7 @@ def index_malicious_packages_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177615,10 +173177,8 @@ def index_malicious_packages_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -177672,7 +173232,6 @@ def index_malicious_packages_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177721,8 +173280,7 @@ def index_malicious_packages_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177780,10 +173338,8 @@ def index_malicious_packages_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -177837,7 +173393,6 @@ def index_malicious_packages_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -177886,8 +173441,7 @@ def index_malicious_packages_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -177945,10 +173499,8 @@ def index_malicious_packages_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -178002,7 +173554,6 @@ def index_malicious_packages_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -178047,7 +173598,6 @@ def _index_malicious_packages_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -178148,10 +173698,6 @@ def _index_malicious_packages_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -178233,8 +173779,7 @@ def index_manageengine_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -178292,10 +173837,8 @@ def index_manageengine_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -178349,7 +173892,6 @@ def index_manageengine_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -178398,8 +173940,7 @@ def index_manageengine_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -178457,10 +173998,8 @@ def index_manageengine_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -178514,7 +174053,6 @@ def index_manageengine_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -178563,8 +174101,7 @@ def index_manageengine_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -178622,10 +174159,8 @@ def index_manageengine_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -178679,7 +174214,6 @@ def index_manageengine_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -178724,7 +174258,6 @@ def _index_manageengine_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -178825,10 +174358,6 @@ def _index_manageengine_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -178910,8 +174439,7 @@ def index_maven_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -178969,10 +174497,8 @@ def index_maven_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179026,7 +174552,6 @@ def index_maven_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179075,8 +174600,7 @@ def index_maven_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179134,10 +174658,8 @@ def index_maven_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179191,7 +174713,6 @@ def index_maven_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179240,8 +174761,7 @@ def index_maven_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179299,10 +174819,8 @@ def index_maven_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179356,7 +174874,6 @@ def index_maven_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179401,7 +174918,6 @@ def _index_maven_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -179502,10 +175018,6 @@ def _index_maven_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -179587,8 +175099,7 @@ def index_mbed_tls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179646,10 +175157,8 @@ def index_mbed_tls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179703,7 +175212,6 @@ def index_mbed_tls_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179752,8 +175260,7 @@ def index_mbed_tls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179811,10 +175318,8 @@ def index_mbed_tls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -179868,7 +175373,6 @@ def index_mbed_tls_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -179917,8 +175421,7 @@ def index_mbed_tls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -179976,10 +175479,8 @@ def index_mbed_tls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -180033,7 +175534,6 @@ def index_mbed_tls_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -180078,7 +175578,6 @@ def _index_mbed_tls_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -180179,10 +175678,6 @@ def _index_mbed_tls_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -180264,8 +175759,7 @@ def index_mcafee_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -180323,10 +175817,8 @@ def index_mcafee_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -180380,7 +175872,6 @@ def index_mcafee_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -180429,8 +175920,7 @@ def index_mcafee_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -180488,10 +175978,8 @@ def index_mcafee_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -180545,7 +176033,6 @@ def index_mcafee_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -180594,8 +176081,7 @@ def index_mcafee_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -180653,10 +176139,8 @@ def index_mcafee_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -180710,7 +176194,6 @@ def index_mcafee_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -180755,7 +176238,6 @@ def _index_mcafee_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -180856,10 +176338,6 @@ def _index_mcafee_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -180941,8 +176419,7 @@ def index_mediatek_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181000,10 +176477,8 @@ def index_mediatek_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181057,7 +176532,6 @@ def index_mediatek_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181106,8 +176580,7 @@ def index_mediatek_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181165,10 +176638,8 @@ def index_mediatek_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181222,7 +176693,6 @@ def index_mediatek_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181271,8 +176741,7 @@ def index_mediatek_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181330,10 +176799,8 @@ def index_mediatek_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181387,7 +176854,6 @@ def index_mediatek_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181432,7 +176898,6 @@ def _index_mediatek_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -181533,10 +176998,6 @@ def _index_mediatek_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -181618,8 +177079,7 @@ def index_medtronic_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181677,10 +177137,8 @@ def index_medtronic_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181734,7 +177192,6 @@ def index_medtronic_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181783,8 +177240,7 @@ def index_medtronic_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -181842,10 +177298,8 @@ def index_medtronic_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -181899,7 +177353,6 @@ def index_medtronic_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -181948,8 +177401,7 @@ def index_medtronic_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -182007,10 +177459,8 @@ def index_medtronic_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -182064,7 +177514,6 @@ def index_medtronic_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -182109,7 +177558,6 @@ def _index_medtronic_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -182210,10 +177658,6 @@ def _index_medtronic_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -182295,8 +177739,7 @@ def index_mendix_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -182354,10 +177797,8 @@ def index_mendix_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -182411,7 +177852,6 @@ def index_mendix_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -182460,8 +177900,7 @@ def index_mendix_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -182519,10 +177958,8 @@ def index_mendix_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -182576,7 +178013,6 @@ def index_mendix_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -182625,8 +178061,7 @@ def index_mendix_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -182684,10 +178119,8 @@ def index_mendix_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -182741,7 +178174,6 @@ def index_mendix_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -182786,7 +178218,6 @@ def _index_mendix_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -182887,10 +178318,6 @@ def _index_mendix_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -182972,8 +178399,7 @@ def index_meta_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183031,10 +178457,8 @@ def index_meta_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183088,7 +178512,6 @@ def index_meta_advisories_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183137,8 +178560,7 @@ def index_meta_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183196,10 +178618,8 @@ def index_meta_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183253,7 +178673,6 @@ def index_meta_advisories_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183302,8 +178721,7 @@ def index_meta_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183361,10 +178779,8 @@ def index_meta_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183418,7 +178834,6 @@ def index_meta_advisories_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183463,7 +178878,6 @@ def _index_meta_advisories_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -183564,10 +178978,6 @@ def _index_meta_advisories_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -183649,8 +179059,7 @@ def index_metasploit_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183708,10 +179117,8 @@ def index_metasploit_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183765,7 +179172,6 @@ def index_metasploit_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183814,8 +179220,7 @@ def index_metasploit_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -183873,10 +179278,8 @@ def index_metasploit_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -183930,7 +179333,6 @@ def index_metasploit_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -183979,8 +179381,7 @@ def index_metasploit_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -184038,10 +179439,8 @@ def index_metasploit_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -184095,7 +179494,6 @@ def index_metasploit_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -184140,7 +179538,6 @@ def _index_metasploit_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -184241,10 +179638,6 @@ def _index_metasploit_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -184326,8 +179719,7 @@ def index_microsoft_csaf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -184385,10 +179777,8 @@ def index_microsoft_csaf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -184442,7 +179832,6 @@ def index_microsoft_csaf_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -184491,8 +179880,7 @@ def index_microsoft_csaf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -184550,10 +179938,8 @@ def index_microsoft_csaf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -184607,7 +179993,6 @@ def index_microsoft_csaf_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -184656,8 +180041,7 @@ def index_microsoft_csaf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -184715,10 +180099,8 @@ def index_microsoft_csaf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -184772,7 +180154,6 @@ def index_microsoft_csaf_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -184817,7 +180198,6 @@ def _index_microsoft_csaf_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -184918,10 +180298,6 @@ def _index_microsoft_csaf_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -185003,8 +180379,7 @@ def index_microsoft_cvrf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185062,10 +180437,8 @@ def index_microsoft_cvrf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185119,7 +180492,6 @@ def index_microsoft_cvrf_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -185168,8 +180540,7 @@ def index_microsoft_cvrf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185227,10 +180598,8 @@ def index_microsoft_cvrf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185284,7 +180653,6 @@ def index_microsoft_cvrf_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -185333,8 +180701,7 @@ def index_microsoft_cvrf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185392,10 +180759,8 @@ def index_microsoft_cvrf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185449,7 +180814,6 @@ def index_microsoft_cvrf_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -185494,7 +180858,6 @@ def _index_microsoft_cvrf_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -185595,10 +180958,6 @@ def _index_microsoft_cvrf_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -185680,8 +181039,7 @@ def index_microsoft_driver_block_list_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185739,10 +181097,8 @@ def index_microsoft_driver_block_list_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185796,7 +181152,6 @@ def index_microsoft_driver_block_list_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -185845,8 +181200,7 @@ def index_microsoft_driver_block_list_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -185904,10 +181258,8 @@ def index_microsoft_driver_block_list_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -185961,7 +181313,6 @@ def index_microsoft_driver_block_list_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186010,8 +181361,7 @@ def index_microsoft_driver_block_list_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -186069,10 +181419,8 @@ def index_microsoft_driver_block_list_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -186126,7 +181474,6 @@ def index_microsoft_driver_block_list_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186171,7 +181518,6 @@ def _index_microsoft_driver_block_list_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -186272,10 +181618,6 @@ def _index_microsoft_driver_block_list_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -186357,8 +181699,7 @@ def index_microsoft_kb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -186416,10 +181757,8 @@ def index_microsoft_kb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -186473,7 +181812,6 @@ def index_microsoft_kb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186522,8 +181860,7 @@ def index_microsoft_kb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -186581,10 +181918,8 @@ def index_microsoft_kb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -186638,7 +181973,6 @@ def index_microsoft_kb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186687,8 +182021,7 @@ def index_microsoft_kb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -186746,10 +182079,8 @@ def index_microsoft_kb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -186803,7 +182134,6 @@ def index_microsoft_kb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -186848,7 +182178,6 @@ def _index_microsoft_kb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -186949,10 +182278,6 @@ def _index_microsoft_kb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -187034,8 +182359,7 @@ def index_mikrotik_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187093,10 +182417,8 @@ def index_mikrotik_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187150,7 +182472,6 @@ def index_mikrotik_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -187199,8 +182520,7 @@ def index_mikrotik_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187258,10 +182578,8 @@ def index_mikrotik_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187315,7 +182633,6 @@ def index_mikrotik_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -187364,8 +182681,7 @@ def index_mikrotik_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187423,10 +182739,8 @@ def index_mikrotik_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187480,7 +182794,6 @@ def index_mikrotik_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -187525,7 +182838,6 @@ def _index_mikrotik_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -187626,10 +182938,6 @@ def _index_mikrotik_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -187711,8 +183019,7 @@ def index_mindray_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187770,10 +183077,8 @@ def index_mindray_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187827,7 +183132,6 @@ def index_mindray_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -187876,8 +183180,7 @@ def index_mindray_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -187935,10 +183238,8 @@ def index_mindray_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -187992,7 +183293,6 @@ def index_mindray_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188041,8 +183341,7 @@ def index_mindray_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -188100,10 +183399,8 @@ def index_mindray_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -188157,7 +183454,6 @@ def index_mindray_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188202,7 +183498,6 @@ def _index_mindray_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -188303,10 +183598,6 @@ def _index_mindray_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -188388,8 +183679,7 @@ def index_misp_threat_actors_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -188447,10 +183737,8 @@ def index_misp_threat_actors_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -188504,7 +183792,6 @@ def index_misp_threat_actors_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188553,8 +183840,7 @@ def index_misp_threat_actors_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -188612,10 +183898,8 @@ def index_misp_threat_actors_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -188669,7 +183953,6 @@ def index_misp_threat_actors_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188718,8 +184001,7 @@ def index_misp_threat_actors_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -188777,10 +184059,8 @@ def index_misp_threat_actors_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -188834,7 +184114,6 @@ def index_misp_threat_actors_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -188879,7 +184158,6 @@ def _index_misp_threat_actors_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -188980,10 +184258,6 @@ def _index_misp_threat_actors_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -189065,8 +184339,7 @@ def index_mitel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189124,10 +184397,8 @@ def index_mitel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -189181,7 +184452,6 @@ def index_mitel_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -189230,8 +184500,7 @@ def index_mitel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189289,10 +184558,8 @@ def index_mitel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -189346,7 +184613,6 @@ def index_mitel_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -189395,8 +184661,7 @@ def index_mitel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189454,10 +184719,8 @@ def index_mitel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -189511,7 +184774,6 @@ def index_mitel_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -189556,7 +184818,6 @@ def _index_mitel_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -189657,10 +184918,6 @@ def _index_mitel_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -189742,8 +184999,7 @@ def index_mitre_attack_cve_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189801,10 +185057,8 @@ def index_mitre_attack_cve_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -189858,7 +185112,6 @@ def index_mitre_attack_cve_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -189907,8 +185160,7 @@ def index_mitre_attack_cve_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -189966,10 +185218,8 @@ def index_mitre_attack_cve_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190023,7 +185273,6 @@ def index_mitre_attack_cve_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190072,8 +185321,7 @@ def index_mitre_attack_cve_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -190131,10 +185379,8 @@ def index_mitre_attack_cve_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190188,7 +185434,6 @@ def index_mitre_attack_cve_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190233,7 +185478,6 @@ def _index_mitre_attack_cve_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -190334,10 +185578,6 @@ def _index_mitre_attack_cve_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -190419,8 +185659,7 @@ def index_mitre_cvelist_v5_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -190478,10 +185717,8 @@ def index_mitre_cvelist_v5_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190535,7 +185772,6 @@ def index_mitre_cvelist_v5_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190584,8 +185820,7 @@ def index_mitre_cvelist_v5_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -190643,10 +185878,8 @@ def index_mitre_cvelist_v5_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190700,7 +185933,6 @@ def index_mitre_cvelist_v5_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190749,8 +185981,7 @@ def index_mitre_cvelist_v5_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -190808,10 +186039,8 @@ def index_mitre_cvelist_v5_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -190865,7 +186094,6 @@ def index_mitre_cvelist_v5_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -190910,7 +186138,6 @@ def _index_mitre_cvelist_v5_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -191011,10 +186238,6 @@ def _index_mitre_cvelist_v5_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -191096,8 +186319,7 @@ def index_mitsubishi_electric_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191155,10 +186377,8 @@ def index_mitsubishi_electric_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -191212,7 +186432,6 @@ def index_mitsubishi_electric_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -191261,8 +186480,7 @@ def index_mitsubishi_electric_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191320,10 +186538,8 @@ def index_mitsubishi_electric_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -191377,7 +186593,6 @@ def index_mitsubishi_electric_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -191426,8 +186641,7 @@ def index_mitsubishi_electric_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191485,10 +186699,8 @@ def index_mitsubishi_electric_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -191542,7 +186754,6 @@ def index_mitsubishi_electric_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -191587,7 +186798,6 @@ def _index_mitsubishi_electric_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -191688,10 +186898,6 @@ def _index_mitsubishi_electric_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -191773,8 +186979,7 @@ def index_mongodb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191832,10 +187037,8 @@ def index_mongodb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -191889,7 +187092,6 @@ def index_mongodb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -191938,8 +187140,7 @@ def index_mongodb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -191997,10 +187198,8 @@ def index_mongodb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192054,7 +187253,6 @@ def index_mongodb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192103,8 +187301,7 @@ def index_mongodb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -192162,10 +187359,8 @@ def index_mongodb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192219,7 +187414,6 @@ def index_mongodb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192264,7 +187458,6 @@ def _index_mongodb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -192365,10 +187558,6 @@ def _index_mongodb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -192450,8 +187639,7 @@ def index_moxa_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -192509,10 +187697,8 @@ def index_moxa_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192566,7 +187752,6 @@ def index_moxa_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192615,8 +187800,7 @@ def index_moxa_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -192674,10 +187858,8 @@ def index_moxa_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192731,7 +187913,6 @@ def index_moxa_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192780,8 +187961,7 @@ def index_moxa_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -192839,10 +188019,8 @@ def index_moxa_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -192896,7 +188074,6 @@ def index_moxa_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -192941,7 +188118,6 @@ def _index_moxa_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -193042,10 +188218,6 @@ def _index_moxa_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -193127,8 +188299,7 @@ def index_mozilla_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193186,10 +188357,8 @@ def index_mozilla_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -193243,7 +188412,6 @@ def index_mozilla_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -193292,8 +188460,7 @@ def index_mozilla_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193351,10 +188518,8 @@ def index_mozilla_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -193408,7 +188573,6 @@ def index_mozilla_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -193457,8 +188621,7 @@ def index_mozilla_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193516,10 +188679,8 @@ def index_mozilla_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -193573,7 +188734,6 @@ def index_mozilla_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -193618,7 +188778,6 @@ def _index_mozilla_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -193719,10 +188878,6 @@ def _index_mozilla_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -193804,8 +188959,7 @@ def index_naver_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -193863,10 +189017,8 @@ def index_naver_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -193920,7 +189072,6 @@ def index_naver_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -193969,8 +189120,7 @@ def index_naver_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194028,10 +189178,8 @@ def index_naver_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194085,7 +189233,6 @@ def index_naver_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194134,8 +189281,7 @@ def index_naver_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194193,10 +189339,8 @@ def index_naver_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194250,7 +189394,6 @@ def index_naver_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194295,7 +189438,6 @@ def _index_naver_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -194396,10 +189538,6 @@ def _index_naver_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -194481,8 +189619,7 @@ def index_ncsc_cves_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194540,10 +189677,8 @@ def index_ncsc_cves_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194597,7 +189732,6 @@ def index_ncsc_cves_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194646,8 +189780,7 @@ def index_ncsc_cves_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194705,10 +189838,8 @@ def index_ncsc_cves_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194762,7 +189893,6 @@ def index_ncsc_cves_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194811,8 +189941,7 @@ def index_ncsc_cves_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -194870,10 +189999,8 @@ def index_ncsc_cves_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -194927,7 +190054,6 @@ def index_ncsc_cves_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -194972,7 +190098,6 @@ def _index_ncsc_cves_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -195073,10 +190198,6 @@ def _index_ncsc_cves_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -195158,8 +190279,7 @@ def index_ncsc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -195217,10 +190337,8 @@ def index_ncsc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -195274,7 +190392,6 @@ def index_ncsc_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -195323,8 +190440,7 @@ def index_ncsc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -195382,10 +190498,8 @@ def index_ncsc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -195439,7 +190553,6 @@ def index_ncsc_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -195488,8 +190601,7 @@ def index_ncsc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -195547,10 +190659,8 @@ def index_ncsc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -195604,7 +190714,6 @@ def index_ncsc_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -195649,7 +190758,6 @@ def _index_ncsc_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -195750,10 +190858,6 @@ def _index_ncsc_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -195835,8 +190939,7 @@ def index_nec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -195894,10 +190997,8 @@ def index_nec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -195951,7 +191052,6 @@ def index_nec_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196000,8 +191100,7 @@ def index_nec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196059,10 +191158,8 @@ def index_nec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196116,7 +191213,6 @@ def index_nec_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196165,8 +191261,7 @@ def index_nec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196224,10 +191319,8 @@ def index_nec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196281,7 +191374,6 @@ def index_nec_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196326,7 +191418,6 @@ def _index_nec_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -196427,10 +191518,6 @@ def _index_nec_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -196512,8 +191599,7 @@ def index_nessus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196571,10 +191657,8 @@ def index_nessus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196628,7 +191712,6 @@ def index_nessus_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196677,8 +191760,7 @@ def index_nessus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196736,10 +191818,8 @@ def index_nessus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196793,7 +191873,6 @@ def index_nessus_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -196842,8 +191921,7 @@ def index_nessus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -196901,10 +191979,8 @@ def index_nessus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -196958,7 +192034,6 @@ def index_nessus_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -197003,7 +192078,6 @@ def _index_nessus_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -197104,10 +192178,6 @@ def _index_nessus_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -197189,8 +192259,7 @@ def index_netapp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -197248,10 +192317,8 @@ def index_netapp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -197305,7 +192372,6 @@ def index_netapp_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -197354,8 +192420,7 @@ def index_netapp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -197413,10 +192478,8 @@ def index_netapp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -197470,7 +192533,6 @@ def index_netapp_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -197519,8 +192581,7 @@ def index_netapp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -197578,10 +192639,8 @@ def index_netapp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -197635,7 +192694,6 @@ def index_netapp_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -197680,7 +192738,6 @@ def _index_netapp_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -197781,10 +192838,6 @@ def _index_netapp_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -197866,8 +192919,7 @@ def index_netatalk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -197925,10 +192977,8 @@ def index_netatalk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -197982,7 +193032,6 @@ def index_netatalk_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198031,8 +193080,7 @@ def index_netatalk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198090,10 +193138,8 @@ def index_netatalk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198147,7 +193193,6 @@ def index_netatalk_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198196,8 +193241,7 @@ def index_netatalk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198255,10 +193299,8 @@ def index_netatalk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198312,7 +193354,6 @@ def index_netatalk_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198357,7 +193398,6 @@ def _index_netatalk_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -198458,10 +193498,6 @@ def _index_netatalk_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -198543,8 +193579,7 @@ def index_netgate_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198602,10 +193637,8 @@ def index_netgate_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198659,7 +193692,6 @@ def index_netgate_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198708,8 +193740,7 @@ def index_netgate_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198767,10 +193798,8 @@ def index_netgate_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198824,7 +193853,6 @@ def index_netgate_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -198873,8 +193901,7 @@ def index_netgate_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -198932,10 +193959,8 @@ def index_netgate_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -198989,7 +194014,6 @@ def index_netgate_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -199034,7 +194058,6 @@ def _index_netgate_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -199135,10 +194158,6 @@ def _index_netgate_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -199220,8 +194239,7 @@ def index_netgear_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -199279,10 +194297,8 @@ def index_netgear_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -199336,7 +194352,6 @@ def index_netgear_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -199385,8 +194400,7 @@ def index_netgear_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -199444,10 +194458,8 @@ def index_netgear_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -199501,7 +194513,6 @@ def index_netgear_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -199550,8 +194561,7 @@ def index_netgear_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -199609,10 +194619,8 @@ def index_netgear_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -199666,7 +194674,6 @@ def index_netgear_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -199711,7 +194718,6 @@ def _index_netgear_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -199812,10 +194818,6 @@ def _index_netgear_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -199897,8 +194899,7 @@ def index_netskope_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -199956,10 +194957,8 @@ def index_netskope_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200013,7 +195012,6 @@ def index_netskope_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200062,8 +195060,7 @@ def index_netskope_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200121,10 +195118,8 @@ def index_netskope_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200178,7 +195173,6 @@ def index_netskope_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200227,8 +195221,7 @@ def index_netskope_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200286,10 +195279,8 @@ def index_netskope_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200343,7 +195334,6 @@ def index_netskope_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200388,7 +195378,6 @@ def _index_netskope_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -200489,10 +195478,6 @@ def _index_netskope_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -200574,8 +195559,7 @@ def index_nexpose_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200633,10 +195617,8 @@ def index_nexpose_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200690,7 +195672,6 @@ def index_nexpose_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200739,8 +195720,7 @@ def index_nexpose_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200798,10 +195778,8 @@ def index_nexpose_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -200855,7 +195833,6 @@ def index_nexpose_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -200904,8 +195881,7 @@ def index_nexpose_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -200963,10 +195939,8 @@ def index_nexpose_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -201020,7 +195994,6 @@ def index_nexpose_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -201065,7 +196038,6 @@ def _index_nexpose_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -201166,10 +196138,6 @@ def _index_nexpose_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -201251,8 +196219,7 @@ def index_nginx_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -201310,10 +196277,8 @@ def index_nginx_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -201367,7 +196332,6 @@ def index_nginx_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -201416,8 +196380,7 @@ def index_nginx_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -201475,10 +196438,8 @@ def index_nginx_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -201532,7 +196493,6 @@ def index_nginx_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -201581,8 +196541,7 @@ def index_nginx_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -201640,10 +196599,8 @@ def index_nginx_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -201697,7 +196654,6 @@ def index_nginx_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -201742,7 +196698,6 @@ def _index_nginx_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -201843,10 +196798,6 @@ def _index_nginx_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -201928,8 +196879,7 @@ def index_nhs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -201987,10 +196937,8 @@ def index_nhs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202044,7 +196992,6 @@ def index_nhs_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202093,8 +197040,7 @@ def index_nhs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202152,10 +197098,8 @@ def index_nhs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202209,7 +197153,6 @@ def index_nhs_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202258,8 +197201,7 @@ def index_nhs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202317,10 +197259,8 @@ def index_nhs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202374,7 +197314,6 @@ def index_nhs_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202419,7 +197358,6 @@ def _index_nhs_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -202520,10 +197458,6 @@ def _index_nhs_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -202605,8 +197539,7 @@ def index_ni_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202664,10 +197597,8 @@ def index_ni_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202721,7 +197652,6 @@ def index_ni_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202770,8 +197700,7 @@ def index_ni_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202829,10 +197758,8 @@ def index_ni_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -202886,7 +197813,6 @@ def index_ni_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -202935,8 +197861,7 @@ def index_ni_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -202994,10 +197919,8 @@ def index_ni_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -203051,7 +197974,6 @@ def index_ni_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -203096,7 +198018,6 @@ def _index_ni_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -203197,10 +198118,6 @@ def _index_ni_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -203282,8 +198199,7 @@ def index_nist_nvd2_cpematch_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -203341,10 +198257,8 @@ def index_nist_nvd2_cpematch_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -203398,7 +198312,6 @@ def index_nist_nvd2_cpematch_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -203447,8 +198360,7 @@ def index_nist_nvd2_cpematch_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -203506,10 +198418,8 @@ def index_nist_nvd2_cpematch_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -203563,7 +198473,6 @@ def index_nist_nvd2_cpematch_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -203612,8 +198521,7 @@ def index_nist_nvd2_cpematch_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -203671,10 +198579,8 @@ def index_nist_nvd2_cpematch_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -203728,7 +198634,6 @@ def index_nist_nvd2_cpematch_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -203773,7 +198678,6 @@ def _index_nist_nvd2_cpematch_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -203874,10 +198778,6 @@ def _index_nist_nvd2_cpematch_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -203959,8 +198859,7 @@ def index_nist_nvd2_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204018,10 +198917,8 @@ def index_nist_nvd2_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204075,7 +198972,6 @@ def index_nist_nvd2_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204124,8 +199020,7 @@ def index_nist_nvd2_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204183,10 +199078,8 @@ def index_nist_nvd2_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204240,7 +199133,6 @@ def index_nist_nvd2_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204289,8 +199181,7 @@ def index_nist_nvd2_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204348,10 +199239,8 @@ def index_nist_nvd2_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204405,7 +199294,6 @@ def index_nist_nvd2_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204450,7 +199338,6 @@ def _index_nist_nvd2_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -204551,10 +199438,6 @@ def _index_nist_nvd2_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -204636,8 +199519,7 @@ def index_nist_nvd2_sources_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204695,10 +199577,8 @@ def index_nist_nvd2_sources_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204752,7 +199632,6 @@ def index_nist_nvd2_sources_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204801,8 +199680,7 @@ def index_nist_nvd2_sources_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -204860,10 +199738,8 @@ def index_nist_nvd2_sources_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -204917,7 +199793,6 @@ def index_nist_nvd2_sources_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -204966,8 +199841,7 @@ def index_nist_nvd2_sources_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -205025,10 +199899,8 @@ def index_nist_nvd2_sources_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -205082,7 +199954,6 @@ def index_nist_nvd2_sources_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -205127,7 +199998,6 @@ def _index_nist_nvd2_sources_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -205228,10 +200098,6 @@ def _index_nist_nvd2_sources_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -205313,8 +200179,7 @@ def index_nist_nvd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -205372,10 +200237,8 @@ def index_nist_nvd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -205429,7 +200292,6 @@ def index_nist_nvd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -205478,8 +200340,7 @@ def index_nist_nvd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -205537,10 +200398,8 @@ def index_nist_nvd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -205594,7 +200453,6 @@ def index_nist_nvd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -205643,8 +200501,7 @@ def index_nist_nvd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -205702,10 +200559,8 @@ def index_nist_nvd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -205759,7 +200614,6 @@ def index_nist_nvd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -205804,7 +200658,6 @@ def _index_nist_nvd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -205905,10 +200758,6 @@ def _index_nist_nvd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -205990,8 +200839,7 @@ def index_node_security_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206049,10 +200897,8 @@ def index_node_security_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206106,7 +200952,6 @@ def index_node_security_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206155,8 +201000,7 @@ def index_node_security_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206214,10 +201058,8 @@ def index_node_security_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206271,7 +201113,6 @@ def index_node_security_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206320,8 +201161,7 @@ def index_node_security_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206379,10 +201219,8 @@ def index_node_security_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206436,7 +201274,6 @@ def index_node_security_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206481,7 +201318,6 @@ def _index_node_security_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -206582,10 +201418,6 @@ def _index_node_security_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -206667,8 +201499,7 @@ def index_nodejs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206726,10 +201557,8 @@ def index_nodejs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206783,7 +201612,6 @@ def index_nodejs_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206832,8 +201660,7 @@ def index_nodejs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -206891,10 +201718,8 @@ def index_nodejs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -206948,7 +201773,6 @@ def index_nodejs_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -206997,8 +201821,7 @@ def index_nodejs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -207056,10 +201879,8 @@ def index_nodejs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -207113,7 +201934,6 @@ def index_nodejs_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -207158,7 +201978,6 @@ def _index_nodejs_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -207259,10 +202078,6 @@ def _index_nodejs_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -207344,8 +202159,7 @@ def index_nokia_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -207403,10 +202217,8 @@ def index_nokia_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -207460,7 +202272,6 @@ def index_nokia_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -207509,8 +202320,7 @@ def index_nokia_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -207568,10 +202378,8 @@ def index_nokia_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -207625,7 +202433,6 @@ def index_nokia_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -207674,8 +202481,7 @@ def index_nokia_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -207733,10 +202539,8 @@ def index_nokia_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -207790,7 +202594,6 @@ def index_nokia_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -207835,7 +202638,6 @@ def _index_nokia_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -207936,10 +202738,6 @@ def _index_nokia_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -208021,8 +202819,7 @@ def index_notepadplusplus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208080,10 +202877,8 @@ def index_notepadplusplus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208137,7 +202932,6 @@ def index_notepadplusplus_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -208186,8 +202980,7 @@ def index_notepadplusplus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208245,10 +203038,8 @@ def index_notepadplusplus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208302,7 +203093,6 @@ def index_notepadplusplus_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -208351,8 +203141,7 @@ def index_notepadplusplus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208410,10 +203199,8 @@ def index_notepadplusplus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208467,7 +203254,6 @@ def index_notepadplusplus_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -208512,7 +203298,6 @@ def _index_notepadplusplus_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -208613,10 +203398,6 @@ def _index_notepadplusplus_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -208698,8 +203479,7 @@ def index_nozomi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208757,10 +203537,8 @@ def index_nozomi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208814,7 +203592,6 @@ def index_nozomi_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -208863,8 +203640,7 @@ def index_nozomi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -208922,10 +203698,8 @@ def index_nozomi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -208979,7 +203753,6 @@ def index_nozomi_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209028,8 +203801,7 @@ def index_nozomi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -209087,10 +203859,8 @@ def index_nozomi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -209144,7 +203914,6 @@ def index_nozomi_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209189,7 +203958,6 @@ def _index_nozomi_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -209290,10 +204058,6 @@ def _index_nozomi_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -209375,8 +204139,7 @@ def index_npm_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -209434,10 +204197,8 @@ def index_npm_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -209491,7 +204252,6 @@ def index_npm_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209540,8 +204300,7 @@ def index_npm_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -209599,10 +204358,8 @@ def index_npm_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -209656,7 +204413,6 @@ def index_npm_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209705,8 +204461,7 @@ def index_npm_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -209764,10 +204519,8 @@ def index_npm_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -209821,7 +204574,6 @@ def index_npm_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -209866,7 +204618,6 @@ def _index_npm_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -209967,10 +204718,6 @@ def _index_npm_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -210052,8 +204799,7 @@ def index_ntp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210111,10 +204857,8 @@ def index_ntp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -210168,7 +204912,6 @@ def index_ntp_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -210217,8 +204960,7 @@ def index_ntp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210276,10 +205018,8 @@ def index_ntp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -210333,7 +205073,6 @@ def index_ntp_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -210382,8 +205121,7 @@ def index_ntp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210441,10 +205179,8 @@ def index_ntp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -210498,7 +205234,6 @@ def index_ntp_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -210543,7 +205278,6 @@ def _index_ntp_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -210644,10 +205378,6 @@ def _index_ntp_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -210729,8 +205459,7 @@ def index_nuclei_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210788,10 +205517,8 @@ def index_nuclei_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -210845,7 +205572,6 @@ def index_nuclei_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -210894,8 +205620,7 @@ def index_nuclei_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -210953,10 +205678,8 @@ def index_nuclei_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211010,7 +205733,6 @@ def index_nuclei_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211059,8 +205781,7 @@ def index_nuclei_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -211118,10 +205839,8 @@ def index_nuclei_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211175,7 +205894,6 @@ def index_nuclei_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211220,7 +205938,6 @@ def _index_nuclei_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -211321,10 +206038,6 @@ def _index_nuclei_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -211406,8 +206119,7 @@ def index_nuget_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -211465,10 +206177,8 @@ def index_nuget_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211522,7 +206232,6 @@ def index_nuget_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211571,8 +206280,7 @@ def index_nuget_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -211630,10 +206338,8 @@ def index_nuget_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211687,7 +206393,6 @@ def index_nuget_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211736,8 +206441,7 @@ def index_nuget_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -211795,10 +206499,8 @@ def index_nuget_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -211852,7 +206554,6 @@ def index_nuget_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -211897,7 +206598,6 @@ def _index_nuget_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -211998,10 +206698,6 @@ def _index_nuget_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -212083,8 +206779,7 @@ def index_nvd_cpe_dictionary_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212142,10 +206837,8 @@ def index_nvd_cpe_dictionary_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -212199,7 +206892,6 @@ def index_nvd_cpe_dictionary_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -212248,8 +206940,7 @@ def index_nvd_cpe_dictionary_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212307,10 +206998,8 @@ def index_nvd_cpe_dictionary_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -212364,7 +207053,6 @@ def index_nvd_cpe_dictionary_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -212413,8 +207101,7 @@ def index_nvd_cpe_dictionary_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212472,10 +207159,8 @@ def index_nvd_cpe_dictionary_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -212529,7 +207214,6 @@ def index_nvd_cpe_dictionary_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -212574,7 +207258,6 @@ def _index_nvd_cpe_dictionary_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -212675,10 +207358,6 @@ def _index_nvd_cpe_dictionary_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -212760,8 +207439,7 @@ def index_nvidia_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212819,10 +207497,8 @@ def index_nvidia_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -212876,7 +207552,6 @@ def index_nvidia_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -212925,8 +207600,7 @@ def index_nvidia_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -212984,10 +207658,8 @@ def index_nvidia_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213041,7 +207713,6 @@ def index_nvidia_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213090,8 +207761,7 @@ def index_nvidia_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -213149,10 +207819,8 @@ def index_nvidia_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213206,7 +207874,6 @@ def index_nvidia_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213251,7 +207918,6 @@ def _index_nvidia_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -213352,10 +208018,6 @@ def _index_nvidia_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -213437,8 +208099,7 @@ def index_nz_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -213496,10 +208157,8 @@ def index_nz_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213553,7 +208212,6 @@ def index_nz_advisories_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213602,8 +208260,7 @@ def index_nz_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -213661,10 +208318,8 @@ def index_nz_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213718,7 +208373,6 @@ def index_nz_advisories_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213767,8 +208421,7 @@ def index_nz_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -213826,10 +208479,8 @@ def index_nz_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -213883,7 +208534,6 @@ def index_nz_advisories_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -213928,7 +208578,6 @@ def _index_nz_advisories_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -214029,10 +208678,6 @@ def _index_nz_advisories_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -214114,8 +208759,7 @@ def index_octopus_deploy_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214173,10 +208817,8 @@ def index_octopus_deploy_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -214230,7 +208872,6 @@ def index_octopus_deploy_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -214279,8 +208920,7 @@ def index_octopus_deploy_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214338,10 +208978,8 @@ def index_octopus_deploy_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -214395,7 +209033,6 @@ def index_octopus_deploy_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -214444,8 +209081,7 @@ def index_octopus_deploy_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214503,10 +209139,8 @@ def index_octopus_deploy_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -214560,7 +209194,6 @@ def index_octopus_deploy_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -214605,7 +209238,6 @@ def _index_octopus_deploy_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -214706,10 +209338,6 @@ def _index_octopus_deploy_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -214791,8 +209419,7 @@ def index_okta_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -214850,10 +209477,8 @@ def index_okta_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -214907,7 +209532,6 @@ def index_okta_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -214956,8 +209580,7 @@ def index_okta_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215015,10 +209638,8 @@ def index_okta_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215072,7 +209693,6 @@ def index_okta_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215121,8 +209741,7 @@ def index_okta_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215180,10 +209799,8 @@ def index_okta_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215237,7 +209854,6 @@ def index_okta_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215282,7 +209898,6 @@ def _index_okta_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -215383,10 +209998,6 @@ def _index_okta_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -215468,8 +210079,7 @@ def index_omron_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215527,10 +210137,8 @@ def index_omron_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215584,7 +210192,6 @@ def index_omron_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215633,8 +210240,7 @@ def index_omron_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215692,10 +210298,8 @@ def index_omron_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215749,7 +210353,6 @@ def index_omron_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215798,8 +210401,7 @@ def index_omron_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -215857,10 +210459,8 @@ def index_omron_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -215914,7 +210514,6 @@ def index_omron_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -215959,7 +210558,6 @@ def _index_omron_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -216060,10 +210658,6 @@ def _index_omron_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -216145,8 +210739,7 @@ def index_one_e_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -216204,10 +210797,8 @@ def index_one_e_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -216261,7 +210852,6 @@ def index_one_e_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -216310,8 +210900,7 @@ def index_one_e_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -216369,10 +210958,8 @@ def index_one_e_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -216426,7 +211013,6 @@ def index_one_e_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -216475,8 +211061,7 @@ def index_one_e_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -216534,10 +211119,8 @@ def index_one_e_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -216591,7 +211174,6 @@ def index_one_e_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -216636,7 +211218,6 @@ def _index_one_e_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -216737,10 +211318,6 @@ def _index_one_e_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -216822,8 +211399,7 @@ def index_opam_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -216881,10 +211457,8 @@ def index_opam_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -216938,7 +211512,6 @@ def index_opam_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -216987,8 +211560,7 @@ def index_opam_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217046,10 +211618,8 @@ def index_opam_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217103,7 +211673,6 @@ def index_opam_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217152,8 +211721,7 @@ def index_opam_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217211,10 +211779,8 @@ def index_opam_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217268,7 +211834,6 @@ def index_opam_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217313,7 +211878,6 @@ def _index_opam_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -217414,10 +211978,6 @@ def _index_opam_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -217499,8 +212059,7 @@ def index_open_cvdb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217558,10 +212117,8 @@ def index_open_cvdb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217615,7 +212172,6 @@ def index_open_cvdb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217664,8 +212220,7 @@ def index_open_cvdb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217723,10 +212278,8 @@ def index_open_cvdb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217780,7 +212333,6 @@ def index_open_cvdb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217829,8 +212381,7 @@ def index_open_cvdb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -217888,10 +212439,8 @@ def index_open_cvdb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -217945,7 +212494,6 @@ def index_open_cvdb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -217990,7 +212538,6 @@ def _index_open_cvdb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -218091,10 +212638,6 @@ def _index_open_cvdb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -218176,8 +212719,7 @@ def index_openbsd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -218235,10 +212777,8 @@ def index_openbsd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -218292,7 +212832,6 @@ def index_openbsd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -218341,8 +212880,7 @@ def index_openbsd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -218400,10 +212938,8 @@ def index_openbsd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -218457,7 +212993,6 @@ def index_openbsd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -218506,8 +213041,7 @@ def index_openbsd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -218565,10 +213099,8 @@ def index_openbsd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -218622,7 +213154,6 @@ def index_openbsd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -218667,7 +213198,6 @@ def _index_openbsd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -218768,10 +213298,6 @@ def _index_openbsd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -218853,8 +213379,7 @@ def index_opengear_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -218912,10 +213437,8 @@ def index_opengear_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -218969,7 +213492,6 @@ def index_opengear_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219018,8 +213540,7 @@ def index_opengear_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219077,10 +213598,8 @@ def index_opengear_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219134,7 +213653,6 @@ def index_opengear_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219183,8 +213701,7 @@ def index_opengear_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219242,10 +213759,8 @@ def index_opengear_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219299,7 +213814,6 @@ def index_opengear_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219344,7 +213858,6 @@ def _index_opengear_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -219445,10 +213958,6 @@ def _index_opengear_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -219530,8 +214039,7 @@ def index_openjdk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219589,10 +214097,8 @@ def index_openjdk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219646,7 +214152,6 @@ def index_openjdk_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219695,8 +214200,7 @@ def index_openjdk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219754,10 +214258,8 @@ def index_openjdk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219811,7 +214313,6 @@ def index_openjdk_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -219860,8 +214361,7 @@ def index_openjdk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -219919,10 +214419,8 @@ def index_openjdk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -219976,7 +214474,6 @@ def index_openjdk_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -220021,7 +214518,6 @@ def _index_openjdk_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -220122,10 +214618,6 @@ def _index_openjdk_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -220207,8 +214699,7 @@ def index_openssh_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -220266,10 +214757,8 @@ def index_openssh_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -220323,7 +214812,6 @@ def index_openssh_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -220372,8 +214860,7 @@ def index_openssh_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -220431,10 +214918,8 @@ def index_openssh_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -220488,7 +214973,6 @@ def index_openssh_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -220537,8 +215021,7 @@ def index_openssh_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -220596,10 +215079,8 @@ def index_openssh_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -220653,7 +215134,6 @@ def index_openssh_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -220698,7 +215178,6 @@ def _index_openssh_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -220799,10 +215278,6 @@ def _index_openssh_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -220884,8 +215359,7 @@ def index_openssl_secadv_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -220943,10 +215417,8 @@ def index_openssl_secadv_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221000,7 +215472,6 @@ def index_openssl_secadv_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221049,8 +215520,7 @@ def index_openssl_secadv_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221108,10 +215578,8 @@ def index_openssl_secadv_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221165,7 +215633,6 @@ def index_openssl_secadv_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221214,8 +215681,7 @@ def index_openssl_secadv_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221273,10 +215739,8 @@ def index_openssl_secadv_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221330,7 +215794,6 @@ def index_openssl_secadv_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221375,7 +215838,6 @@ def _index_openssl_secadv_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -221476,10 +215938,6 @@ def _index_openssl_secadv_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -221561,8 +216019,7 @@ def index_openstack_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221620,10 +216077,8 @@ def index_openstack_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221677,7 +216132,6 @@ def index_openstack_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221726,8 +216180,7 @@ def index_openstack_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221785,10 +216238,8 @@ def index_openstack_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -221842,7 +216293,6 @@ def index_openstack_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -221891,8 +216341,7 @@ def index_openstack_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -221950,10 +216399,8 @@ def index_openstack_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -222007,7 +216454,6 @@ def index_openstack_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -222052,7 +216498,6 @@ def _index_openstack_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -222153,10 +216598,6 @@ def _index_openstack_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -222238,8 +216679,7 @@ def index_openwrt_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -222297,10 +216737,8 @@ def index_openwrt_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -222354,7 +216792,6 @@ def index_openwrt_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -222403,8 +216840,7 @@ def index_openwrt_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -222462,10 +216898,8 @@ def index_openwrt_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -222519,7 +216953,6 @@ def index_openwrt_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -222568,8 +217001,7 @@ def index_openwrt_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -222627,10 +217059,8 @@ def index_openwrt_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -222684,7 +217114,6 @@ def index_openwrt_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -222729,7 +217158,6 @@ def _index_openwrt_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -222830,10 +217258,6 @@ def _index_openwrt_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -222915,8 +217339,7 @@ def index_oracle_cpu_csaf_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -222974,10 +217397,8 @@ def index_oracle_cpu_csaf_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223031,7 +217452,6 @@ def index_oracle_cpu_csaf_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223080,8 +217500,7 @@ def index_oracle_cpu_csaf_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223139,10 +217558,8 @@ def index_oracle_cpu_csaf_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223196,7 +217613,6 @@ def index_oracle_cpu_csaf_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223245,8 +217661,7 @@ def index_oracle_cpu_csaf_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223304,10 +217719,8 @@ def index_oracle_cpu_csaf_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223361,7 +217774,6 @@ def index_oracle_cpu_csaf_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223406,7 +217818,6 @@ def _index_oracle_cpu_csaf_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -223507,10 +217918,6 @@ def _index_oracle_cpu_csaf_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -223592,8 +217999,7 @@ def index_oracle_cpu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223651,10 +218057,8 @@ def index_oracle_cpu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223708,7 +218112,6 @@ def index_oracle_cpu_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223757,8 +218160,7 @@ def index_oracle_cpu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223816,10 +218218,8 @@ def index_oracle_cpu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -223873,7 +218273,6 @@ def index_oracle_cpu_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -223922,8 +218321,7 @@ def index_oracle_cpu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -223981,10 +218379,8 @@ def index_oracle_cpu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -224038,7 +218434,6 @@ def index_oracle_cpu_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -224083,7 +218478,6 @@ def _index_oracle_cpu_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -224184,10 +218578,6 @@ def _index_oracle_cpu_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -224269,8 +218659,7 @@ def index_oracle_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -224328,10 +218717,8 @@ def index_oracle_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -224385,7 +218772,6 @@ def index_oracle_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -224434,8 +218820,7 @@ def index_oracle_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -224493,10 +218878,8 @@ def index_oracle_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -224550,7 +218933,6 @@ def index_oracle_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -224599,8 +218981,7 @@ def index_oracle_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -224658,10 +219039,8 @@ def index_oracle_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -224715,7 +219094,6 @@ def index_oracle_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -224760,7 +219138,6 @@ def _index_oracle_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -224861,10 +219238,6 @@ def _index_oracle_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -224946,8 +219319,7 @@ def index_osv_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225005,10 +219377,8 @@ def index_osv_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225062,7 +219432,6 @@ def index_osv_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225111,8 +219480,7 @@ def index_osv_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225170,10 +219538,8 @@ def index_osv_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225227,7 +219593,6 @@ def index_osv_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225276,8 +219641,7 @@ def index_osv_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225335,10 +219699,8 @@ def index_osv_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225392,7 +219754,6 @@ def index_osv_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225437,7 +219798,6 @@ def _index_osv_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -225538,10 +219898,6 @@ def _index_osv_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -225623,8 +219979,7 @@ def index_otrs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225682,10 +220037,8 @@ def index_otrs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225739,7 +220092,6 @@ def index_otrs_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225788,8 +220140,7 @@ def index_otrs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -225847,10 +220198,8 @@ def index_otrs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -225904,7 +220253,6 @@ def index_otrs_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -225953,8 +220301,7 @@ def index_otrs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -226012,10 +220359,8 @@ def index_otrs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -226069,7 +220414,6 @@ def index_otrs_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -226114,7 +220458,6 @@ def _index_otrs_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -226215,10 +220558,6 @@ def _index_otrs_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -226300,8 +220639,7 @@ def index_owncloud_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -226359,10 +220697,8 @@ def index_owncloud_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -226416,7 +220752,6 @@ def index_owncloud_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -226465,8 +220800,7 @@ def index_owncloud_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -226524,10 +220858,8 @@ def index_owncloud_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -226581,7 +220913,6 @@ def index_owncloud_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -226630,8 +220961,7 @@ def index_owncloud_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -226689,10 +221019,8 @@ def index_owncloud_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -226746,7 +221074,6 @@ def index_owncloud_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -226791,7 +221118,6 @@ def _index_owncloud_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -226892,10 +221218,6 @@ def _index_owncloud_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -226977,8 +221299,7 @@ def index_packetstorm_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227036,10 +221357,8 @@ def index_packetstorm_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227093,7 +221412,6 @@ def index_packetstorm_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227142,8 +221460,7 @@ def index_packetstorm_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227201,10 +221518,8 @@ def index_packetstorm_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227258,7 +221573,6 @@ def index_packetstorm_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227307,8 +221621,7 @@ def index_packetstorm_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227366,10 +221679,8 @@ def index_packetstorm_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227423,7 +221734,6 @@ def index_packetstorm_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227468,7 +221778,6 @@ def _index_packetstorm_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -227569,10 +221878,6 @@ def _index_packetstorm_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -227654,8 +221959,7 @@ def index_palantir_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227713,10 +222017,8 @@ def index_palantir_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227770,7 +222072,6 @@ def index_palantir_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227819,8 +222120,7 @@ def index_palantir_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -227878,10 +222178,8 @@ def index_palantir_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -227935,7 +222233,6 @@ def index_palantir_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -227984,8 +222281,7 @@ def index_palantir_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -228043,10 +222339,8 @@ def index_palantir_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -228100,7 +222394,6 @@ def index_palantir_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -228145,7 +222438,6 @@ def _index_palantir_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -228246,10 +222538,6 @@ def _index_palantir_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -228331,8 +222619,7 @@ def index_palo_alto_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -228390,10 +222677,8 @@ def index_palo_alto_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -228447,7 +222732,6 @@ def index_palo_alto_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -228496,8 +222780,7 @@ def index_palo_alto_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -228555,10 +222838,8 @@ def index_palo_alto_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -228612,7 +222893,6 @@ def index_palo_alto_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -228661,8 +222941,7 @@ def index_palo_alto_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -228720,10 +222999,8 @@ def index_palo_alto_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -228777,7 +223054,6 @@ def index_palo_alto_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -228822,7 +223098,6 @@ def _index_palo_alto_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -228923,10 +223198,6 @@ def _index_palo_alto_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -229008,8 +223279,7 @@ def index_panasonic_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229067,10 +223337,8 @@ def index_panasonic_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229124,7 +223392,6 @@ def index_panasonic_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -229173,8 +223440,7 @@ def index_panasonic_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229232,10 +223498,8 @@ def index_panasonic_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229289,7 +223553,6 @@ def index_panasonic_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -229338,8 +223601,7 @@ def index_panasonic_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229397,10 +223659,8 @@ def index_panasonic_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229454,7 +223714,6 @@ def index_panasonic_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -229499,7 +223758,6 @@ def _index_panasonic_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -229600,10 +223858,6 @@ def _index_panasonic_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -229685,8 +223939,7 @@ def index_papercut_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229744,10 +223997,8 @@ def index_papercut_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229801,7 +224052,6 @@ def index_papercut_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -229850,8 +224100,7 @@ def index_papercut_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -229909,10 +224158,8 @@ def index_papercut_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -229966,7 +224213,6 @@ def index_papercut_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230015,8 +224261,7 @@ def index_papercut_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -230074,10 +224319,8 @@ def index_papercut_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -230131,7 +224374,6 @@ def index_papercut_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230176,7 +224418,6 @@ def _index_papercut_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -230277,10 +224518,6 @@ def _index_papercut_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -230362,8 +224599,7 @@ def index_pega_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -230421,10 +224657,8 @@ def index_pega_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -230478,7 +224712,6 @@ def index_pega_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230527,8 +224760,7 @@ def index_pega_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -230586,10 +224818,8 @@ def index_pega_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -230643,7 +224873,6 @@ def index_pega_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230692,8 +224921,7 @@ def index_pega_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -230751,10 +224979,8 @@ def index_pega_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -230808,7 +225034,6 @@ def index_pega_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -230853,7 +225078,6 @@ def _index_pega_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -230954,10 +225178,6 @@ def _index_pega_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -231039,8 +225259,7 @@ def index_philips_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231098,10 +225317,8 @@ def index_philips_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231155,7 +225372,6 @@ def index_philips_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -231204,8 +225420,7 @@ def index_philips_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231263,10 +225478,8 @@ def index_philips_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231320,7 +225533,6 @@ def index_philips_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -231369,8 +225581,7 @@ def index_philips_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231428,10 +225639,8 @@ def index_philips_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231485,7 +225694,6 @@ def index_philips_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -231530,7 +225738,6 @@ def _index_philips_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -231631,10 +225838,6 @@ def _index_philips_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -231716,8 +225919,7 @@ def index_phoenix_contact_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231775,10 +225977,8 @@ def index_phoenix_contact_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231832,7 +226032,6 @@ def index_phoenix_contact_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -231881,8 +226080,7 @@ def index_phoenix_contact_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -231940,10 +226138,8 @@ def index_phoenix_contact_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -231997,7 +226193,6 @@ def index_phoenix_contact_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232046,8 +226241,7 @@ def index_phoenix_contact_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -232105,10 +226299,8 @@ def index_phoenix_contact_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -232162,7 +226354,6 @@ def index_phoenix_contact_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232207,7 +226398,6 @@ def _index_phoenix_contact_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -232308,10 +226498,6 @@ def _index_phoenix_contact_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -232393,8 +226579,7 @@ def index_php_my_admin_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -232452,10 +226637,8 @@ def index_php_my_admin_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -232509,7 +226692,6 @@ def index_php_my_admin_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232558,8 +226740,7 @@ def index_php_my_admin_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -232617,10 +226798,8 @@ def index_php_my_admin_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -232674,7 +226853,6 @@ def index_php_my_admin_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232723,8 +226901,7 @@ def index_php_my_admin_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -232782,10 +226959,8 @@ def index_php_my_admin_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -232839,7 +227014,6 @@ def index_php_my_admin_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -232884,7 +227058,6 @@ def _index_php_my_admin_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -232985,10 +227158,6 @@ def _index_php_my_admin_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -233070,8 +227239,7 @@ def index_pkcert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233129,10 +227297,8 @@ def index_pkcert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -233186,7 +227352,6 @@ def index_pkcert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -233235,8 +227400,7 @@ def index_pkcert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233294,10 +227458,8 @@ def index_pkcert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -233351,7 +227513,6 @@ def index_pkcert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -233400,8 +227561,7 @@ def index_pkcert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233459,10 +227619,8 @@ def index_pkcert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -233516,7 +227674,6 @@ def index_pkcert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -233561,7 +227718,6 @@ def _index_pkcert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -233662,10 +227818,6 @@ def _index_pkcert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -233747,8 +227899,7 @@ def index_postgressql_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233806,10 +227957,8 @@ def index_postgressql_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -233863,7 +228012,6 @@ def index_postgressql_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -233912,8 +228060,7 @@ def index_postgressql_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -233971,10 +228118,8 @@ def index_postgressql_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234028,7 +228173,6 @@ def index_postgressql_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234077,8 +228221,7 @@ def index_postgressql_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -234136,10 +228279,8 @@ def index_postgressql_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234193,7 +228334,6 @@ def index_postgressql_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234238,7 +228378,6 @@ def _index_postgressql_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -234339,10 +228478,6 @@ def _index_postgressql_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -234424,8 +228559,7 @@ def index_powerdns_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -234483,10 +228617,8 @@ def index_powerdns_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234540,7 +228672,6 @@ def index_powerdns_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234589,8 +228720,7 @@ def index_powerdns_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -234648,10 +228778,8 @@ def index_powerdns_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234705,7 +228833,6 @@ def index_powerdns_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234754,8 +228881,7 @@ def index_powerdns_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -234813,10 +228939,8 @@ def index_powerdns_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -234870,7 +228994,6 @@ def index_powerdns_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -234915,7 +229038,6 @@ def _index_powerdns_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -235016,10 +229138,6 @@ def _index_powerdns_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -235101,8 +229219,7 @@ def index_progress_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235160,10 +229277,8 @@ def index_progress_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -235217,7 +229332,6 @@ def index_progress_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -235266,8 +229380,7 @@ def index_progress_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235325,10 +229438,8 @@ def index_progress_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -235382,7 +229493,6 @@ def index_progress_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -235431,8 +229541,7 @@ def index_progress_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235490,10 +229599,8 @@ def index_progress_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -235547,7 +229654,6 @@ def index_progress_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -235592,7 +229698,6 @@ def _index_progress_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -235693,10 +229798,6 @@ def _index_progress_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -235778,8 +229879,7 @@ def index_proofpoint_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -235837,10 +229937,8 @@ def index_proofpoint_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -235894,7 +229992,6 @@ def index_proofpoint_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -235943,8 +230040,7 @@ def index_proofpoint_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236002,10 +230098,8 @@ def index_proofpoint_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236059,7 +230153,6 @@ def index_proofpoint_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236108,8 +230201,7 @@ def index_proofpoint_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236167,10 +230259,8 @@ def index_proofpoint_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236224,7 +230314,6 @@ def index_proofpoint_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236269,7 +230358,6 @@ def _index_proofpoint_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -236370,10 +230458,6 @@ def _index_proofpoint_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -236455,8 +230539,7 @@ def index_ptc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236514,10 +230597,8 @@ def index_ptc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236571,7 +230652,6 @@ def index_ptc_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236620,8 +230700,7 @@ def index_ptc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236679,10 +230758,8 @@ def index_ptc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236736,7 +230813,6 @@ def index_ptc_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236785,8 +230861,7 @@ def index_ptc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -236844,10 +230919,8 @@ def index_ptc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -236901,7 +230974,6 @@ def index_ptc_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -236946,7 +231018,6 @@ def _index_ptc_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -237047,10 +231118,6 @@ def _index_ptc_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -237132,8 +231199,7 @@ def index_pub_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237191,10 +231257,8 @@ def index_pub_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -237248,7 +231312,6 @@ def index_pub_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -237297,8 +231360,7 @@ def index_pub_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237356,10 +231418,8 @@ def index_pub_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -237413,7 +231473,6 @@ def index_pub_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -237462,8 +231521,7 @@ def index_pub_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237521,10 +231579,8 @@ def index_pub_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -237578,7 +231634,6 @@ def index_pub_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -237623,7 +231678,6 @@ def _index_pub_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -237724,10 +231778,6 @@ def _index_pub_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -237809,8 +231859,7 @@ def index_pure_storage_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -237868,10 +231917,8 @@ def index_pure_storage_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -237925,7 +231972,6 @@ def index_pure_storage_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -237974,8 +232020,7 @@ def index_pure_storage_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238033,10 +232078,8 @@ def index_pure_storage_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238090,7 +232133,6 @@ def index_pure_storage_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238139,8 +232181,7 @@ def index_pure_storage_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238198,10 +232239,8 @@ def index_pure_storage_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238255,7 +232294,6 @@ def index_pure_storage_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238300,7 +232338,6 @@ def _index_pure_storage_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -238401,10 +232438,6 @@ def _index_pure_storage_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -238486,8 +232519,7 @@ def index_pypa_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238545,10 +232577,8 @@ def index_pypa_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238602,7 +232632,6 @@ def index_pypa_advisories_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238651,8 +232680,7 @@ def index_pypa_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238710,10 +232738,8 @@ def index_pypa_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238767,7 +232793,6 @@ def index_pypa_advisories_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238816,8 +232841,7 @@ def index_pypa_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -238875,10 +232899,8 @@ def index_pypa_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -238932,7 +232954,6 @@ def index_pypa_advisories_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -238977,7 +232998,6 @@ def _index_pypa_advisories_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -239078,10 +233098,6 @@ def _index_pypa_advisories_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -239163,8 +233179,7 @@ def index_pypi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -239222,10 +233237,8 @@ def index_pypi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -239279,7 +233292,6 @@ def index_pypi_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -239328,8 +233340,7 @@ def index_pypi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -239387,10 +233398,8 @@ def index_pypi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -239444,7 +233453,6 @@ def index_pypi_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -239493,8 +233501,7 @@ def index_pypi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -239552,10 +233559,8 @@ def index_pypi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -239609,7 +233614,6 @@ def index_pypi_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -239654,7 +233658,6 @@ def _index_pypi_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -239755,10 +233758,6 @@ def _index_pypi_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -239840,8 +233839,7 @@ def index_qnap_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -239899,10 +233897,8 @@ def index_qnap_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -239956,7 +233952,6 @@ def index_qnap_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240005,8 +234000,7 @@ def index_qnap_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240064,10 +234058,8 @@ def index_qnap_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240121,7 +234113,6 @@ def index_qnap_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240170,8 +234161,7 @@ def index_qnap_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240229,10 +234219,8 @@ def index_qnap_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240286,7 +234274,6 @@ def index_qnap_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240331,7 +234318,6 @@ def _index_qnap_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -240432,10 +234418,6 @@ def _index_qnap_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -240517,8 +234499,7 @@ def index_qqids_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240576,10 +234557,8 @@ def index_qqids_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240633,7 +234612,6 @@ def index_qqids_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240682,8 +234660,7 @@ def index_qqids_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240741,10 +234718,8 @@ def index_qqids_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240798,7 +234773,6 @@ def index_qqids_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -240847,8 +234821,7 @@ def index_qqids_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -240906,10 +234879,8 @@ def index_qqids_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -240963,7 +234934,6 @@ def index_qqids_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -241008,7 +234978,6 @@ def _index_qqids_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -241109,10 +235078,6 @@ def _index_qqids_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -241194,8 +235159,7 @@ def index_qualcomm_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -241253,10 +235217,8 @@ def index_qualcomm_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -241310,7 +235272,6 @@ def index_qualcomm_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -241359,8 +235320,7 @@ def index_qualcomm_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -241418,10 +235378,8 @@ def index_qualcomm_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -241475,7 +235433,6 @@ def index_qualcomm_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -241524,8 +235481,7 @@ def index_qualcomm_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -241583,10 +235539,8 @@ def index_qualcomm_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -241640,7 +235594,6 @@ def index_qualcomm_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -241685,7 +235638,6 @@ def _index_qualcomm_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -241786,10 +235738,6 @@ def _index_qualcomm_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -241871,8 +235819,7 @@ def index_qualys_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -241930,10 +235877,8 @@ def index_qualys_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -241987,7 +235932,6 @@ def index_qualys_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242036,8 +235980,7 @@ def index_qualys_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242095,10 +236038,8 @@ def index_qualys_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242152,7 +236093,6 @@ def index_qualys_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242201,8 +236141,7 @@ def index_qualys_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242260,10 +236199,8 @@ def index_qualys_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242317,7 +236254,6 @@ def index_qualys_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242362,7 +236298,6 @@ def _index_qualys_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -242463,10 +236398,6 @@ def _index_qualys_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -242548,8 +236479,7 @@ def index_qualys_qids_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242607,10 +236537,8 @@ def index_qualys_qids_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242664,7 +236592,6 @@ def index_qualys_qids_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242713,8 +236640,7 @@ def index_qualys_qids_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242772,10 +236698,8 @@ def index_qualys_qids_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242829,7 +236753,6 @@ def index_qualys_qids_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -242878,8 +236801,7 @@ def index_qualys_qids_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -242937,10 +236859,8 @@ def index_qualys_qids_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -242994,7 +236914,6 @@ def index_qualys_qids_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -243039,7 +236958,6 @@ def _index_qualys_qids_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -243140,10 +237058,6 @@ def _index_qualys_qids_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -243225,8 +237139,7 @@ def index_qubes_qsb_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -243284,10 +237197,8 @@ def index_qubes_qsb_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -243341,7 +237252,6 @@ def index_qubes_qsb_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -243390,8 +237300,7 @@ def index_qubes_qsb_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -243449,10 +237358,8 @@ def index_qubes_qsb_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -243506,7 +237413,6 @@ def index_qubes_qsb_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -243555,8 +237461,7 @@ def index_qubes_qsb_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -243614,10 +237519,8 @@ def index_qubes_qsb_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -243671,7 +237574,6 @@ def index_qubes_qsb_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -243716,7 +237618,6 @@ def _index_qubes_qsb_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -243817,10 +237718,6 @@ def _index_qubes_qsb_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -243902,8 +237799,7 @@ def index_ransomware_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -243961,10 +237857,8 @@ def index_ransomware_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244018,7 +237912,6 @@ def index_ransomware_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244067,8 +237960,7 @@ def index_ransomware_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244126,10 +238018,8 @@ def index_ransomware_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244183,7 +238073,6 @@ def index_ransomware_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244232,8 +238121,7 @@ def index_ransomware_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244291,10 +238179,8 @@ def index_ransomware_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244348,7 +238234,6 @@ def index_ransomware_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244393,7 +238278,6 @@ def _index_ransomware_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -244494,10 +238378,6 @@ def _index_ransomware_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -244579,8 +238459,7 @@ def index_red_lion_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244638,10 +238517,8 @@ def index_red_lion_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244695,7 +238572,6 @@ def index_red_lion_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244744,8 +238620,7 @@ def index_red_lion_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244803,10 +238678,8 @@ def index_red_lion_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -244860,7 +238733,6 @@ def index_red_lion_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -244909,8 +238781,7 @@ def index_red_lion_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -244968,10 +238839,8 @@ def index_red_lion_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -245025,7 +238894,6 @@ def index_red_lion_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -245070,7 +238938,6 @@ def _index_red_lion_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -245171,10 +239038,6 @@ def _index_red_lion_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -245256,8 +239119,7 @@ def index_redhat_cves_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -245315,10 +239177,8 @@ def index_redhat_cves_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -245372,7 +239232,6 @@ def index_redhat_cves_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -245421,8 +239280,7 @@ def index_redhat_cves_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -245480,10 +239338,8 @@ def index_redhat_cves_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -245537,7 +239393,6 @@ def index_redhat_cves_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -245586,8 +239441,7 @@ def index_redhat_cves_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -245645,10 +239499,8 @@ def index_redhat_cves_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -245702,7 +239554,6 @@ def index_redhat_cves_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -245747,7 +239598,6 @@ def _index_redhat_cves_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -245848,10 +239698,6 @@ def _index_redhat_cves_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -245933,8 +239779,7 @@ def index_redhat_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -245992,10 +239837,8 @@ def index_redhat_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246049,7 +239892,6 @@ def index_redhat_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246098,8 +239940,7 @@ def index_redhat_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246157,10 +239998,8 @@ def index_redhat_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246214,7 +240053,6 @@ def index_redhat_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246263,8 +240101,7 @@ def index_redhat_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246322,10 +240159,8 @@ def index_redhat_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246379,7 +240214,6 @@ def index_redhat_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246424,7 +240258,6 @@ def _index_redhat_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -246525,10 +240358,6 @@ def _index_redhat_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -246610,8 +240439,7 @@ def index_renesas_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246669,10 +240497,8 @@ def index_renesas_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246726,7 +240552,6 @@ def index_renesas_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246775,8 +240600,7 @@ def index_renesas_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246834,10 +240658,8 @@ def index_renesas_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -246891,7 +240713,6 @@ def index_renesas_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -246940,8 +240761,7 @@ def index_renesas_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -246999,10 +240819,8 @@ def index_renesas_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -247056,7 +240874,6 @@ def index_renesas_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -247101,7 +240918,6 @@ def _index_renesas_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -247202,10 +241018,6 @@ def _index_renesas_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -247287,8 +241099,7 @@ def index_revive_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -247346,10 +241157,8 @@ def index_revive_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -247403,7 +241212,6 @@ def index_revive_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -247452,8 +241260,7 @@ def index_revive_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -247511,10 +241318,8 @@ def index_revive_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -247568,7 +241373,6 @@ def index_revive_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -247617,8 +241421,7 @@ def index_revive_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -247676,10 +241479,8 @@ def index_revive_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -247733,7 +241534,6 @@ def index_revive_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -247778,7 +241578,6 @@ def _index_revive_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -247879,10 +241678,6 @@ def _index_revive_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -247964,8 +241759,7 @@ def index_roche_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248023,10 +241817,8 @@ def index_roche_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248080,7 +241872,6 @@ def index_roche_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248129,8 +241920,7 @@ def index_roche_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248188,10 +241978,8 @@ def index_roche_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248245,7 +242033,6 @@ def index_roche_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248294,8 +242081,7 @@ def index_roche_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248353,10 +242139,8 @@ def index_roche_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248410,7 +242194,6 @@ def index_roche_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248455,7 +242238,6 @@ def _index_roche_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -248556,10 +242338,6 @@ def _index_roche_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -248641,8 +242419,7 @@ def index_rockwell_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248700,10 +242477,8 @@ def index_rockwell_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248757,7 +242532,6 @@ def index_rockwell_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248806,8 +242580,7 @@ def index_rockwell_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -248865,10 +242638,8 @@ def index_rockwell_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -248922,7 +242693,6 @@ def index_rockwell_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -248971,8 +242741,7 @@ def index_rockwell_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -249030,10 +242799,8 @@ def index_rockwell_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -249087,7 +242854,6 @@ def index_rockwell_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -249132,7 +242898,6 @@ def _index_rockwell_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -249233,10 +242998,6 @@ def _index_rockwell_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -249318,8 +243079,7 @@ def index_rocky_errata_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -249377,10 +243137,8 @@ def index_rocky_errata_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -249434,7 +243192,6 @@ def index_rocky_errata_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -249483,8 +243240,7 @@ def index_rocky_errata_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -249542,10 +243298,8 @@ def index_rocky_errata_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -249599,7 +243353,6 @@ def index_rocky_errata_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -249648,8 +243401,7 @@ def index_rocky_errata_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -249707,10 +243459,8 @@ def index_rocky_errata_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -249764,7 +243514,6 @@ def index_rocky_errata_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -249809,7 +243558,6 @@ def _index_rocky_errata_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -249910,10 +243658,6 @@ def _index_rocky_errata_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -249995,8 +243739,7 @@ def index_rocky_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250054,10 +243797,8 @@ def index_rocky_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250111,7 +243852,6 @@ def index_rocky_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -250160,8 +243900,7 @@ def index_rocky_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250219,10 +243958,8 @@ def index_rocky_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250276,7 +244013,6 @@ def index_rocky_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -250325,8 +244061,7 @@ def index_rocky_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250384,10 +244119,8 @@ def index_rocky_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250441,7 +244174,6 @@ def index_rocky_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -250486,7 +244218,6 @@ def _index_rocky_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -250587,10 +244318,6 @@ def _index_rocky_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -250672,8 +244399,7 @@ def index_rocky_purls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250731,10 +244457,8 @@ def index_rocky_purls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250788,7 +244512,6 @@ def index_rocky_purls_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -250837,8 +244560,7 @@ def index_rocky_purls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -250896,10 +244618,8 @@ def index_rocky_purls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -250953,7 +244673,6 @@ def index_rocky_purls_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251002,8 +244721,7 @@ def index_rocky_purls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -251061,10 +244779,8 @@ def index_rocky_purls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -251118,7 +244834,6 @@ def index_rocky_purls_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251163,7 +244878,6 @@ def _index_rocky_purls_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -251264,10 +244978,6 @@ def _index_rocky_purls_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -251349,8 +245059,7 @@ def index_rsync_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -251408,10 +245117,8 @@ def index_rsync_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -251465,7 +245172,6 @@ def index_rsync_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251514,8 +245220,7 @@ def index_rsync_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -251573,10 +245278,8 @@ def index_rsync_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -251630,7 +245333,6 @@ def index_rsync_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251679,8 +245381,7 @@ def index_rsync_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -251738,10 +245439,8 @@ def index_rsync_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -251795,7 +245494,6 @@ def index_rsync_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -251840,7 +245538,6 @@ def _index_rsync_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -251941,10 +245638,6 @@ def _index_rsync_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -252026,8 +245719,7 @@ def index_ruckus_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252085,10 +245777,8 @@ def index_ruckus_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252142,7 +245832,6 @@ def index_ruckus_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -252191,8 +245880,7 @@ def index_ruckus_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252250,10 +245938,8 @@ def index_ruckus_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252307,7 +245993,6 @@ def index_ruckus_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -252356,8 +246041,7 @@ def index_ruckus_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252415,10 +246099,8 @@ def index_ruckus_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252472,7 +246154,6 @@ def index_ruckus_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -252517,7 +246198,6 @@ def _index_ruckus_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -252618,10 +246298,6 @@ def _index_ruckus_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -252703,8 +246379,7 @@ def index_rustsec_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252762,10 +246437,8 @@ def index_rustsec_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252819,7 +246492,6 @@ def index_rustsec_advisories_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -252868,8 +246540,7 @@ def index_rustsec_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -252927,10 +246598,8 @@ def index_rustsec_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -252984,7 +246653,6 @@ def index_rustsec_advisories_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253033,8 +246701,7 @@ def index_rustsec_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -253092,10 +246759,8 @@ def index_rustsec_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -253149,7 +246814,6 @@ def index_rustsec_advisories_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253194,7 +246858,6 @@ def _index_rustsec_advisories_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -253295,10 +246958,6 @@ def _index_rustsec_advisories_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -253380,8 +247039,7 @@ def index_sacert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -253439,10 +247097,8 @@ def index_sacert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -253496,7 +247152,6 @@ def index_sacert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253545,8 +247200,7 @@ def index_sacert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -253604,10 +247258,8 @@ def index_sacert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -253661,7 +247313,6 @@ def index_sacert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253710,8 +247361,7 @@ def index_sacert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -253769,10 +247419,8 @@ def index_sacert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -253826,7 +247474,6 @@ def index_sacert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -253871,7 +247518,6 @@ def _index_sacert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -253972,10 +247618,6 @@ def _index_sacert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -254057,8 +247699,7 @@ def index_safran_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254116,10 +247757,8 @@ def index_safran_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -254173,7 +247812,6 @@ def index_safran_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -254222,8 +247860,7 @@ def index_safran_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254281,10 +247918,8 @@ def index_safran_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -254338,7 +247973,6 @@ def index_safran_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -254387,8 +248021,7 @@ def index_safran_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254446,10 +248079,8 @@ def index_safran_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -254503,7 +248134,6 @@ def index_safran_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -254548,7 +248178,6 @@ def _index_safran_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -254649,10 +248278,6 @@ def _index_safran_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -254734,8 +248359,7 @@ def index_saint_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254793,10 +248417,8 @@ def index_saint_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -254850,7 +248472,6 @@ def index_saint_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -254899,8 +248520,7 @@ def index_saint_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -254958,10 +248578,8 @@ def index_saint_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255015,7 +248633,6 @@ def index_saint_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255064,8 +248681,7 @@ def index_saint_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -255123,10 +248739,8 @@ def index_saint_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255180,7 +248794,6 @@ def index_saint_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255225,7 +248838,6 @@ def _index_saint_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -255326,10 +248938,6 @@ def _index_saint_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -255411,8 +249019,7 @@ def index_salesforce_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -255470,10 +249077,8 @@ def index_salesforce_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255527,7 +249132,6 @@ def index_salesforce_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255576,8 +249180,7 @@ def index_salesforce_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -255635,10 +249238,8 @@ def index_salesforce_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255692,7 +249293,6 @@ def index_salesforce_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255741,8 +249341,7 @@ def index_salesforce_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -255800,10 +249399,8 @@ def index_salesforce_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -255857,7 +249454,6 @@ def index_salesforce_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -255902,7 +249498,6 @@ def _index_salesforce_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -256003,10 +249598,6 @@ def _index_salesforce_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -256088,8 +249679,7 @@ def index_samba_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256147,10 +249737,8 @@ def index_samba_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -256204,7 +249792,6 @@ def index_samba_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -256253,8 +249840,7 @@ def index_samba_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256312,10 +249898,8 @@ def index_samba_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -256369,7 +249953,6 @@ def index_samba_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -256418,8 +250001,7 @@ def index_samba_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256477,10 +250059,8 @@ def index_samba_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -256534,7 +250114,6 @@ def index_samba_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -256579,7 +250158,6 @@ def _index_samba_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -256680,10 +250258,6 @@ def _index_samba_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -256765,8 +250339,7 @@ def index_sandisk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256824,10 +250397,8 @@ def index_sandisk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -256881,7 +250452,6 @@ def index_sandisk_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -256930,8 +250500,7 @@ def index_sandisk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -256989,10 +250558,8 @@ def index_sandisk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257046,7 +250613,6 @@ def index_sandisk_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257095,8 +250661,7 @@ def index_sandisk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -257154,10 +250719,8 @@ def index_sandisk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257211,7 +250774,6 @@ def index_sandisk_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257256,7 +250818,6 @@ def _index_sandisk_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -257357,10 +250918,6 @@ def _index_sandisk_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -257442,8 +250999,7 @@ def index_sans_dshield_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -257501,10 +251057,8 @@ def index_sans_dshield_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257558,7 +251112,6 @@ def index_sans_dshield_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257607,8 +251160,7 @@ def index_sans_dshield_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -257666,10 +251218,8 @@ def index_sans_dshield_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257723,7 +251273,6 @@ def index_sans_dshield_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257772,8 +251321,7 @@ def index_sans_dshield_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -257831,10 +251379,8 @@ def index_sans_dshield_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -257888,7 +251434,6 @@ def index_sans_dshield_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -257933,7 +251478,6 @@ def _index_sans_dshield_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -258034,10 +251578,6 @@ def _index_sans_dshield_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -258119,8 +251659,7 @@ def index_sap_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258178,10 +251717,8 @@ def index_sap_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -258235,7 +251772,6 @@ def index_sap_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -258284,8 +251820,7 @@ def index_sap_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258343,10 +251878,8 @@ def index_sap_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -258400,7 +251933,6 @@ def index_sap_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -258449,8 +251981,7 @@ def index_sap_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258508,10 +252039,8 @@ def index_sap_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -258565,7 +252094,6 @@ def index_sap_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -258610,7 +252138,6 @@ def _index_sap_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -258711,10 +252238,6 @@ def _index_sap_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -258796,8 +252319,7 @@ def index_schneider_electric_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -258855,10 +252377,8 @@ def index_schneider_electric_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -258912,7 +252432,6 @@ def index_schneider_electric_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -258961,8 +252480,7 @@ def index_schneider_electric_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259020,10 +252538,8 @@ def index_schneider_electric_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259077,7 +252593,6 @@ def index_schneider_electric_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259126,8 +252641,7 @@ def index_schneider_electric_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259185,10 +252699,8 @@ def index_schneider_electric_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259242,7 +252754,6 @@ def index_schneider_electric_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259287,7 +252798,6 @@ def _index_schneider_electric_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -259388,10 +252898,6 @@ def _index_schneider_electric_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -259473,8 +252979,7 @@ def index_schutzwerk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259532,10 +253037,8 @@ def index_schutzwerk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259589,7 +253092,6 @@ def index_schutzwerk_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259638,8 +253140,7 @@ def index_schutzwerk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259697,10 +253198,8 @@ def index_schutzwerk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259754,7 +253253,6 @@ def index_schutzwerk_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259803,8 +253301,7 @@ def index_schutzwerk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -259862,10 +253359,8 @@ def index_schutzwerk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -259919,7 +253414,6 @@ def index_schutzwerk_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -259964,7 +253458,6 @@ def _index_schutzwerk_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -260065,10 +253558,6 @@ def _index_schutzwerk_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -260150,8 +253639,7 @@ def index_sec_consult_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -260209,10 +253697,8 @@ def index_sec_consult_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -260266,7 +253752,6 @@ def index_sec_consult_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -260315,8 +253800,7 @@ def index_sec_consult_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -260374,10 +253858,8 @@ def index_sec_consult_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -260431,7 +253913,6 @@ def index_sec_consult_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -260480,8 +253961,7 @@ def index_sec_consult_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -260539,10 +254019,8 @@ def index_sec_consult_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -260596,7 +254074,6 @@ def index_sec_consult_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -260641,7 +254118,6 @@ def _index_sec_consult_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -260742,10 +254218,6 @@ def _index_sec_consult_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -260827,8 +254299,7 @@ def index_securitylab_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -260886,10 +254357,8 @@ def index_securitylab_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -260943,7 +254412,6 @@ def index_securitylab_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -260992,8 +254460,7 @@ def index_securitylab_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261051,10 +254518,8 @@ def index_securitylab_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261108,7 +254573,6 @@ def index_securitylab_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261157,8 +254621,7 @@ def index_securitylab_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261216,10 +254679,8 @@ def index_securitylab_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261273,7 +254734,6 @@ def index_securitylab_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261318,7 +254778,6 @@ def _index_securitylab_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -261419,10 +254878,6 @@ def _index_securitylab_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -261504,8 +254959,7 @@ def index_seebug_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261563,10 +255017,8 @@ def index_seebug_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261620,7 +255072,6 @@ def index_seebug_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261669,8 +255120,7 @@ def index_seebug_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261728,10 +255178,8 @@ def index_seebug_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261785,7 +255233,6 @@ def index_seebug_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261834,8 +255281,7 @@ def index_seebug_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -261893,10 +255339,8 @@ def index_seebug_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -261950,7 +255394,6 @@ def index_seebug_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -261995,7 +255438,6 @@ def _index_seebug_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -262096,10 +255538,6 @@ def _index_seebug_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -262181,8 +255619,7 @@ def index_sel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -262240,10 +255677,8 @@ def index_sel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -262297,7 +255732,6 @@ def index_sel_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -262346,8 +255780,7 @@ def index_sel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -262405,10 +255838,8 @@ def index_sel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -262462,7 +255893,6 @@ def index_sel_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -262511,8 +255941,7 @@ def index_sel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -262570,10 +255999,8 @@ def index_sel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -262627,7 +256054,6 @@ def index_sel_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -262672,7 +256098,6 @@ def _index_sel_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -262773,10 +256198,6 @@ def _index_sel_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -262858,8 +256279,7 @@ def index_sentinelone_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -262917,10 +256337,8 @@ def index_sentinelone_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -262974,7 +256392,6 @@ def index_sentinelone_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263023,8 +256440,7 @@ def index_sentinelone_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263082,10 +256498,8 @@ def index_sentinelone_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263139,7 +256553,6 @@ def index_sentinelone_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263188,8 +256601,7 @@ def index_sentinelone_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263247,10 +256659,8 @@ def index_sentinelone_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263304,7 +256714,6 @@ def index_sentinelone_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263349,7 +256758,6 @@ def _index_sentinelone_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -263450,10 +256858,6 @@ def _index_sentinelone_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -263535,8 +256939,7 @@ def index_servicenow_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263594,10 +256997,8 @@ def index_servicenow_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263651,7 +257052,6 @@ def index_servicenow_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263700,8 +257100,7 @@ def index_servicenow_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263759,10 +257158,8 @@ def index_servicenow_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263816,7 +257213,6 @@ def index_servicenow_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -263865,8 +257261,7 @@ def index_servicenow_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -263924,10 +257319,8 @@ def index_servicenow_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -263981,7 +257374,6 @@ def index_servicenow_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -264026,7 +257418,6 @@ def _index_servicenow_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -264127,10 +257518,6 @@ def _index_servicenow_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -264212,8 +257599,7 @@ def index_shadowserver_exploited_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -264271,10 +257657,8 @@ def index_shadowserver_exploited_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -264328,7 +257712,6 @@ def index_shadowserver_exploited_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -264377,8 +257760,7 @@ def index_shadowserver_exploited_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -264436,10 +257818,8 @@ def index_shadowserver_exploited_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -264493,7 +257873,6 @@ def index_shadowserver_exploited_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -264542,8 +257921,7 @@ def index_shadowserver_exploited_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -264601,10 +257979,8 @@ def index_shadowserver_exploited_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -264658,7 +258034,6 @@ def index_shadowserver_exploited_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -264703,7 +258078,6 @@ def _index_shadowserver_exploited_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -264804,10 +258178,6 @@ def _index_shadowserver_exploited_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -264889,8 +258259,7 @@ def index_shielder_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -264948,10 +258317,8 @@ def index_shielder_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265005,7 +258372,6 @@ def index_shielder_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265054,8 +258420,7 @@ def index_shielder_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265113,10 +258478,8 @@ def index_shielder_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265170,7 +258533,6 @@ def index_shielder_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265219,8 +258581,7 @@ def index_shielder_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265278,10 +258639,8 @@ def index_shielder_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265335,7 +258694,6 @@ def index_shielder_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265380,7 +258738,6 @@ def _index_shielder_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -265481,10 +258838,6 @@ def _index_shielder_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -265566,8 +258919,7 @@ def index_sick_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265625,10 +258977,8 @@ def index_sick_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265682,7 +259032,6 @@ def index_sick_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265731,8 +259080,7 @@ def index_sick_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265790,10 +259138,8 @@ def index_sick_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -265847,7 +259193,6 @@ def index_sick_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -265896,8 +259241,7 @@ def index_sick_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -265955,10 +259299,8 @@ def index_sick_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -266012,7 +259354,6 @@ def index_sick_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -266057,7 +259398,6 @@ def _index_sick_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -266158,10 +259498,6 @@ def _index_sick_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -266243,8 +259579,7 @@ def index_siemens_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -266302,10 +259637,8 @@ def index_siemens_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -266359,7 +259692,6 @@ def index_siemens_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -266408,8 +259740,7 @@ def index_siemens_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -266467,10 +259798,8 @@ def index_siemens_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -266524,7 +259853,6 @@ def index_siemens_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -266573,8 +259901,7 @@ def index_siemens_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -266632,10 +259959,8 @@ def index_siemens_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -266689,7 +260014,6 @@ def index_siemens_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -266734,7 +260058,6 @@ def _index_siemens_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -266835,10 +260158,6 @@ def _index_siemens_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -266920,8 +260239,7 @@ def index_sierra_wireless_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -266979,10 +260297,8 @@ def index_sierra_wireless_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267036,7 +260352,6 @@ def index_sierra_wireless_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267085,8 +260400,7 @@ def index_sierra_wireless_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267144,10 +260458,8 @@ def index_sierra_wireless_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267201,7 +260513,6 @@ def index_sierra_wireless_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267250,8 +260561,7 @@ def index_sierra_wireless_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267309,10 +260619,8 @@ def index_sierra_wireless_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267366,7 +260674,6 @@ def index_sierra_wireless_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267411,7 +260718,6 @@ def _index_sierra_wireless_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -267512,10 +260818,6 @@ def _index_sierra_wireless_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -267597,8 +260899,7 @@ def index_sigmahq_sigma_rules_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267656,10 +260957,8 @@ def index_sigmahq_sigma_rules_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267713,7 +261012,6 @@ def index_sigmahq_sigma_rules_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267762,8 +261060,7 @@ def index_sigmahq_sigma_rules_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267821,10 +261118,8 @@ def index_sigmahq_sigma_rules_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -267878,7 +261173,6 @@ def index_sigmahq_sigma_rules_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -267927,8 +261221,7 @@ def index_sigmahq_sigma_rules_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -267986,10 +261279,8 @@ def index_sigmahq_sigma_rules_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -268043,7 +261334,6 @@ def index_sigmahq_sigma_rules_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -268088,7 +261378,6 @@ def _index_sigmahq_sigma_rules_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -268189,10 +261478,6 @@ def _index_sigmahq_sigma_rules_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -268274,8 +261559,7 @@ def index_singcert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -268333,10 +261617,8 @@ def index_singcert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -268390,7 +261672,6 @@ def index_singcert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -268439,8 +261720,7 @@ def index_singcert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -268498,10 +261778,8 @@ def index_singcert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -268555,7 +261833,6 @@ def index_singcert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -268604,8 +261881,7 @@ def index_singcert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -268663,10 +261939,8 @@ def index_singcert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -268720,7 +261994,6 @@ def index_singcert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -268765,7 +262038,6 @@ def _index_singcert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -268866,10 +262138,6 @@ def _index_singcert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -268951,8 +262219,7 @@ def index_sitecore_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269010,10 +262277,8 @@ def index_sitecore_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269067,7 +262332,6 @@ def index_sitecore_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269116,8 +262380,7 @@ def index_sitecore_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269175,10 +262438,8 @@ def index_sitecore_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269232,7 +262493,6 @@ def index_sitecore_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269281,8 +262541,7 @@ def index_sitecore_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269340,10 +262599,8 @@ def index_sitecore_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269397,7 +262654,6 @@ def index_sitecore_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269442,7 +262698,6 @@ def _index_sitecore_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -269543,10 +262798,6 @@ def _index_sitecore_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -269628,8 +262879,7 @@ def index_slackware_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269687,10 +262937,8 @@ def index_slackware_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269744,7 +262992,6 @@ def index_slackware_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269793,8 +263040,7 @@ def index_slackware_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -269852,10 +263098,8 @@ def index_slackware_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -269909,7 +263153,6 @@ def index_slackware_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -269958,8 +263201,7 @@ def index_slackware_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -270017,10 +263259,8 @@ def index_slackware_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -270074,7 +263314,6 @@ def index_slackware_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -270119,7 +263358,6 @@ def _index_slackware_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -270220,10 +263458,6 @@ def _index_slackware_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -270305,8 +263539,7 @@ def index_solarwinds_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -270364,10 +263597,8 @@ def index_solarwinds_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -270421,7 +263652,6 @@ def index_solarwinds_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -270470,8 +263700,7 @@ def index_solarwinds_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -270529,10 +263758,8 @@ def index_solarwinds_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -270586,7 +263813,6 @@ def index_solarwinds_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -270635,8 +263861,7 @@ def index_solarwinds_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -270694,10 +263919,8 @@ def index_solarwinds_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -270751,7 +263974,6 @@ def index_solarwinds_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -270796,7 +264018,6 @@ def _index_solarwinds_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -270897,10 +264118,6 @@ def _index_solarwinds_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -270982,8 +264199,7 @@ def index_solr_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271041,10 +264257,8 @@ def index_solr_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271098,7 +264312,6 @@ def index_solr_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271147,8 +264360,7 @@ def index_solr_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271206,10 +264418,8 @@ def index_solr_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271263,7 +264473,6 @@ def index_solr_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271312,8 +264521,7 @@ def index_solr_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271371,10 +264579,8 @@ def index_solr_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271428,7 +264634,6 @@ def index_solr_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271473,7 +264678,6 @@ def _index_solr_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -271574,10 +264778,6 @@ def _index_solr_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -271659,8 +264859,7 @@ def index_sonatype_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271718,10 +264917,8 @@ def index_sonatype_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271775,7 +264972,6 @@ def index_sonatype_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271824,8 +265020,7 @@ def index_sonatype_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -271883,10 +265078,8 @@ def index_sonatype_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -271940,7 +265133,6 @@ def index_sonatype_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -271989,8 +265181,7 @@ def index_sonatype_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -272048,10 +265239,8 @@ def index_sonatype_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -272105,7 +265294,6 @@ def index_sonatype_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -272150,7 +265338,6 @@ def _index_sonatype_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -272251,10 +265438,6 @@ def _index_sonatype_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -272336,8 +265519,7 @@ def index_sonicwall_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -272395,10 +265577,8 @@ def index_sonicwall_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -272452,7 +265632,6 @@ def index_sonicwall_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -272501,8 +265680,7 @@ def index_sonicwall_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -272560,10 +265738,8 @@ def index_sonicwall_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -272617,7 +265793,6 @@ def index_sonicwall_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -272666,8 +265841,7 @@ def index_sonicwall_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -272725,10 +265899,8 @@ def index_sonicwall_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -272782,7 +265954,6 @@ def index_sonicwall_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -272827,7 +265998,6 @@ def _index_sonicwall_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -272928,10 +266098,6 @@ def _index_sonicwall_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -273013,8 +266179,7 @@ def index_spacelabs_healthcare_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273072,10 +266237,8 @@ def index_spacelabs_healthcare_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273129,7 +266292,6 @@ def index_spacelabs_healthcare_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -273178,8 +266340,7 @@ def index_spacelabs_healthcare_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273237,10 +266398,8 @@ def index_spacelabs_healthcare_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273294,7 +266453,6 @@ def index_spacelabs_healthcare_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -273343,8 +266501,7 @@ def index_spacelabs_healthcare_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273402,10 +266559,8 @@ def index_spacelabs_healthcare_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273459,7 +266614,6 @@ def index_spacelabs_healthcare_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -273504,7 +266658,6 @@ def _index_spacelabs_healthcare_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -273605,10 +266758,6 @@ def _index_spacelabs_healthcare_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -273690,8 +266839,7 @@ def index_splunk_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273749,10 +266897,8 @@ def index_splunk_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273806,7 +266952,6 @@ def index_splunk_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -273855,8 +267000,7 @@ def index_splunk_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -273914,10 +267058,8 @@ def index_splunk_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -273971,7 +267113,6 @@ def index_splunk_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274020,8 +267161,7 @@ def index_splunk_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -274079,10 +267219,8 @@ def index_splunk_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -274136,7 +267274,6 @@ def index_splunk_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274181,7 +267318,6 @@ def _index_splunk_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -274282,10 +267418,6 @@ def _index_splunk_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -274367,8 +267499,7 @@ def index_spring_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -274426,10 +267557,8 @@ def index_spring_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -274483,7 +267612,6 @@ def index_spring_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274532,8 +267660,7 @@ def index_spring_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -274591,10 +267718,8 @@ def index_spring_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -274648,7 +267773,6 @@ def index_spring_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274697,8 +267821,7 @@ def index_spring_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -274756,10 +267879,8 @@ def index_spring_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -274813,7 +267934,6 @@ def index_spring_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -274858,7 +267978,6 @@ def _index_spring_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -274959,10 +268078,6 @@ def _index_spring_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -275044,8 +268159,7 @@ def index_ssd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275103,10 +268217,8 @@ def index_ssd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -275160,7 +268272,6 @@ def index_ssd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -275209,8 +268320,7 @@ def index_ssd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275268,10 +268378,8 @@ def index_ssd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -275325,7 +268433,6 @@ def index_ssd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -275374,8 +268481,7 @@ def index_ssd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275433,10 +268539,8 @@ def index_ssd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -275490,7 +268594,6 @@ def index_ssd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -275535,7 +268638,6 @@ def _index_ssd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -275636,10 +268738,6 @@ def _index_ssd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -275721,8 +268819,7 @@ def index_stormshield_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275780,10 +268877,8 @@ def index_stormshield_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -275837,7 +268932,6 @@ def index_stormshield_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -275886,8 +268980,7 @@ def index_stormshield_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -275945,10 +269038,8 @@ def index_stormshield_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276002,7 +269093,6 @@ def index_stormshield_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276051,8 +269141,7 @@ def index_stormshield_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -276110,10 +269199,8 @@ def index_stormshield_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276167,7 +269254,6 @@ def index_stormshield_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276212,7 +269298,6 @@ def _index_stormshield_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -276313,10 +269398,6 @@ def _index_stormshield_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -276398,8 +269479,7 @@ def index_stryker_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -276457,10 +269537,8 @@ def index_stryker_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276514,7 +269592,6 @@ def index_stryker_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276563,8 +269640,7 @@ def index_stryker_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -276622,10 +269698,8 @@ def index_stryker_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276679,7 +269753,6 @@ def index_stryker_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276728,8 +269801,7 @@ def index_stryker_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -276787,10 +269859,8 @@ def index_stryker_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -276844,7 +269914,6 @@ def index_stryker_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -276889,7 +269958,6 @@ def _index_stryker_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -276990,10 +270058,6 @@ def _index_stryker_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -277075,8 +270139,7 @@ def index_sudo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277134,10 +270197,8 @@ def index_sudo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -277191,7 +270252,6 @@ def index_sudo_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -277240,8 +270300,7 @@ def index_sudo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277299,10 +270358,8 @@ def index_sudo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -277356,7 +270413,6 @@ def index_sudo_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -277405,8 +270461,7 @@ def index_sudo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277464,10 +270519,8 @@ def index_sudo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -277521,7 +270574,6 @@ def index_sudo_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -277566,7 +270618,6 @@ def _index_sudo_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -277667,10 +270718,6 @@ def _index_sudo_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -277752,8 +270799,7 @@ def index_suse_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277811,10 +270857,8 @@ def index_suse_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -277868,7 +270912,6 @@ def index_suse_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -277917,8 +270960,7 @@ def index_suse_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -277976,10 +271018,8 @@ def index_suse_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278033,7 +271073,6 @@ def index_suse_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278082,8 +271121,7 @@ def index_suse_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -278141,10 +271179,8 @@ def index_suse_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278198,7 +271234,6 @@ def index_suse_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278243,7 +271278,6 @@ def _index_suse_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -278344,10 +271378,6 @@ def _index_suse_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -278429,8 +271459,7 @@ def index_suse_security_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -278488,10 +271517,8 @@ def index_suse_security_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278545,7 +271572,6 @@ def index_suse_security_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278594,8 +271620,7 @@ def index_suse_security_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -278653,10 +271678,8 @@ def index_suse_security_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278710,7 +271733,6 @@ def index_suse_security_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278759,8 +271781,7 @@ def index_suse_security_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -278818,10 +271839,8 @@ def index_suse_security_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -278875,7 +271894,6 @@ def index_suse_security_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -278920,7 +271938,6 @@ def _index_suse_security_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -279021,10 +272038,6 @@ def _index_suse_security_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -279106,8 +272119,7 @@ def index_swift_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279165,10 +272177,8 @@ def index_swift_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -279222,7 +272232,6 @@ def index_swift_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -279271,8 +272280,7 @@ def index_swift_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279330,10 +272338,8 @@ def index_swift_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -279387,7 +272393,6 @@ def index_swift_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -279436,8 +272441,7 @@ def index_swift_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279495,10 +272499,8 @@ def index_swift_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -279552,7 +272554,6 @@ def index_swift_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -279597,7 +272598,6 @@ def _index_swift_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -279698,10 +272698,6 @@ def _index_swift_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -279783,8 +272779,7 @@ def index_swisslog_healthcare_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -279842,10 +272837,8 @@ def index_swisslog_healthcare_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -279899,7 +272892,6 @@ def index_swisslog_healthcare_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -279948,8 +272940,7 @@ def index_swisslog_healthcare_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280007,10 +272998,8 @@ def index_swisslog_healthcare_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280064,7 +273053,6 @@ def index_swisslog_healthcare_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280113,8 +273101,7 @@ def index_swisslog_healthcare_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280172,10 +273159,8 @@ def index_swisslog_healthcare_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280229,7 +273214,6 @@ def index_swisslog_healthcare_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280274,7 +273258,6 @@ def _index_swisslog_healthcare_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -280375,10 +273358,6 @@ def _index_swisslog_healthcare_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -280460,8 +273439,7 @@ def index_symfony_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280519,10 +273497,8 @@ def index_symfony_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280576,7 +273552,6 @@ def index_symfony_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280625,8 +273600,7 @@ def index_symfony_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280684,10 +273658,8 @@ def index_symfony_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280741,7 +273713,6 @@ def index_symfony_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280790,8 +273761,7 @@ def index_symfony_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -280849,10 +273819,8 @@ def index_symfony_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -280906,7 +273874,6 @@ def index_symfony_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -280951,7 +273918,6 @@ def _index_symfony_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -281052,10 +274018,6 @@ def _index_symfony_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -281137,8 +274099,7 @@ def index_synacktiv_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281196,10 +274157,8 @@ def index_synacktiv_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -281253,7 +274212,6 @@ def index_synacktiv_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -281302,8 +274260,7 @@ def index_synacktiv_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281361,10 +274318,8 @@ def index_synacktiv_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -281418,7 +274373,6 @@ def index_synacktiv_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -281467,8 +274421,7 @@ def index_synacktiv_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281526,10 +274479,8 @@ def index_synacktiv_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -281583,7 +274534,6 @@ def index_synacktiv_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -281628,7 +274578,6 @@ def _index_synacktiv_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -281729,10 +274678,6 @@ def _index_synacktiv_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -281814,8 +274759,7 @@ def index_syncrosoft_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -281873,10 +274817,8 @@ def index_syncrosoft_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -281930,7 +274872,6 @@ def index_syncrosoft_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -281979,8 +274920,7 @@ def index_syncrosoft_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282038,10 +274978,8 @@ def index_syncrosoft_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282095,7 +275033,6 @@ def index_syncrosoft_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282144,8 +275081,7 @@ def index_syncrosoft_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282203,10 +275139,8 @@ def index_syncrosoft_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282260,7 +275194,6 @@ def index_syncrosoft_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282305,7 +275238,6 @@ def _index_syncrosoft_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -282406,10 +275338,6 @@ def _index_syncrosoft_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -282491,8 +275419,7 @@ def index_synology_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282550,10 +275477,8 @@ def index_synology_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282607,7 +275532,6 @@ def index_synology_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282656,8 +275580,7 @@ def index_synology_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282715,10 +275638,8 @@ def index_synology_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282772,7 +275693,6 @@ def index_synology_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282821,8 +275741,7 @@ def index_synology_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -282880,10 +275799,8 @@ def index_synology_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -282937,7 +275854,6 @@ def index_synology_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -282982,7 +275898,6 @@ def _index_synology_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -283083,10 +275998,6 @@ def _index_synology_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -283168,8 +276079,7 @@ def index_syss_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -283227,10 +276137,8 @@ def index_syss_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -283284,7 +276192,6 @@ def index_syss_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -283333,8 +276240,7 @@ def index_syss_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -283392,10 +276298,8 @@ def index_syss_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -283449,7 +276353,6 @@ def index_syss_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -283498,8 +276401,7 @@ def index_syss_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -283557,10 +276459,8 @@ def index_syss_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -283614,7 +276514,6 @@ def index_syss_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -283659,7 +276558,6 @@ def _index_syss_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -283760,10 +276658,6 @@ def _index_syss_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -283845,8 +276739,7 @@ def index_tailscale_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -283904,10 +276797,8 @@ def index_tailscale_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -283961,7 +276852,6 @@ def index_tailscale_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284010,8 +276900,7 @@ def index_tailscale_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284069,10 +276958,8 @@ def index_tailscale_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284126,7 +277013,6 @@ def index_tailscale_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284175,8 +277061,7 @@ def index_tailscale_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284234,10 +277119,8 @@ def index_tailscale_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284291,7 +277174,6 @@ def index_tailscale_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284336,7 +277218,6 @@ def _index_tailscale_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -284437,10 +277318,6 @@ def _index_tailscale_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -284522,8 +277399,7 @@ def index_teamviewer_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284581,10 +277457,8 @@ def index_teamviewer_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284638,7 +277512,6 @@ def index_teamviewer_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284687,8 +277560,7 @@ def index_teamviewer_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284746,10 +277618,8 @@ def index_teamviewer_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284803,7 +277673,6 @@ def index_teamviewer_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -284852,8 +277721,7 @@ def index_teamviewer_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -284911,10 +277779,8 @@ def index_teamviewer_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -284968,7 +277834,6 @@ def index_teamviewer_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -285013,7 +277878,6 @@ def _index_teamviewer_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -285114,10 +277978,6 @@ def _index_teamviewer_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -285199,8 +278059,7 @@ def index_tenable_research_advisories_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -285258,10 +278117,8 @@ def index_tenable_research_advisories_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -285315,7 +278172,6 @@ def index_tenable_research_advisories_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -285364,8 +278220,7 @@ def index_tenable_research_advisories_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -285423,10 +278278,8 @@ def index_tenable_research_advisories_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -285480,7 +278333,6 @@ def index_tenable_research_advisories_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -285529,8 +278381,7 @@ def index_tenable_research_advisories_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -285588,10 +278439,8 @@ def index_tenable_research_advisories_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -285645,7 +278494,6 @@ def index_tenable_research_advisories_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -285690,7 +278538,6 @@ def _index_tenable_research_advisories_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -285791,10 +278638,6 @@ def _index_tenable_research_advisories_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -285876,8 +278719,7 @@ def index_tencent_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -285935,10 +278777,8 @@ def index_tencent_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -285992,7 +278832,6 @@ def index_tencent_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286041,8 +278880,7 @@ def index_tencent_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286100,10 +278938,8 @@ def index_tencent_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286157,7 +278993,6 @@ def index_tencent_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286206,8 +279041,7 @@ def index_tencent_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286265,10 +279099,8 @@ def index_tencent_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286322,7 +279154,6 @@ def index_tencent_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286367,7 +279198,6 @@ def _index_tencent_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -286468,10 +279298,6 @@ def _index_tencent_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -286553,8 +279379,7 @@ def index_thales_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286612,10 +279437,8 @@ def index_thales_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286669,7 +279492,6 @@ def index_thales_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286718,8 +279540,7 @@ def index_thales_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286777,10 +279598,8 @@ def index_thales_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286834,7 +279653,6 @@ def index_thales_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -286883,8 +279701,7 @@ def index_thales_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -286942,10 +279759,8 @@ def index_thales_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -286999,7 +279814,6 @@ def index_thales_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -287044,7 +279858,6 @@ def _index_thales_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -287145,10 +279958,6 @@ def _index_thales_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -287230,8 +280039,7 @@ def index_themissinglink_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -287289,10 +280097,8 @@ def index_themissinglink_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -287346,7 +280152,6 @@ def index_themissinglink_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -287395,8 +280200,7 @@ def index_themissinglink_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -287454,10 +280258,8 @@ def index_themissinglink_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -287511,7 +280313,6 @@ def index_themissinglink_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -287560,8 +280361,7 @@ def index_themissinglink_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -287619,10 +280419,8 @@ def index_themissinglink_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -287676,7 +280474,6 @@ def index_themissinglink_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -287721,7 +280518,6 @@ def _index_themissinglink_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -287822,10 +280618,6 @@ def _index_themissinglink_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -287907,8 +280699,7 @@ def index_thermo_fisher_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -287966,10 +280757,8 @@ def index_thermo_fisher_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288023,7 +280812,6 @@ def index_thermo_fisher_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288072,8 +280860,7 @@ def index_thermo_fisher_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288131,10 +280918,8 @@ def index_thermo_fisher_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288188,7 +280973,6 @@ def index_thermo_fisher_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288237,8 +281021,7 @@ def index_thermo_fisher_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288296,10 +281079,8 @@ def index_thermo_fisher_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288353,7 +281134,6 @@ def index_thermo_fisher_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288398,7 +281178,6 @@ def _index_thermo_fisher_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -288499,10 +281278,6 @@ def _index_thermo_fisher_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -288584,8 +281359,7 @@ def index_threat_actors_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288643,10 +281417,8 @@ def index_threat_actors_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288700,7 +281472,6 @@ def index_threat_actors_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288749,8 +281520,7 @@ def index_threat_actors_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288808,10 +281578,8 @@ def index_threat_actors_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -288865,7 +281633,6 @@ def index_threat_actors_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -288914,8 +281681,7 @@ def index_threat_actors_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -288973,10 +281739,8 @@ def index_threat_actors_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -289030,7 +281794,6 @@ def index_threat_actors_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -289075,7 +281838,6 @@ def _index_threat_actors_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -289176,10 +281938,6 @@ def _index_threat_actors_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -289261,8 +282019,7 @@ def index_ti_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -289320,10 +282077,8 @@ def index_ti_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -289377,7 +282132,6 @@ def index_ti_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -289426,8 +282180,7 @@ def index_ti_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -289485,10 +282238,8 @@ def index_ti_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -289542,7 +282293,6 @@ def index_ti_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -289591,8 +282341,7 @@ def index_ti_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -289650,10 +282399,8 @@ def index_ti_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -289707,7 +282454,6 @@ def index_ti_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -289752,7 +282498,6 @@ def _index_ti_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -289853,10 +282598,6 @@ def _index_ti_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -289938,8 +282679,7 @@ def index_tibco_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -289997,10 +282737,8 @@ def index_tibco_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290054,7 +282792,6 @@ def index_tibco_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290103,8 +282840,7 @@ def index_tibco_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290162,10 +282898,8 @@ def index_tibco_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290219,7 +282953,6 @@ def index_tibco_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290268,8 +283001,7 @@ def index_tibco_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290327,10 +283059,8 @@ def index_tibco_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290384,7 +283114,6 @@ def index_tibco_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290429,7 +283158,6 @@ def _index_tibco_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -290530,10 +283258,6 @@ def _index_tibco_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -290615,8 +283339,7 @@ def index_tp_link_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290674,10 +283397,8 @@ def index_tp_link_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290731,7 +283452,6 @@ def index_tp_link_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290780,8 +283500,7 @@ def index_tp_link_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -290839,10 +283558,8 @@ def index_tp_link_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -290896,7 +283613,6 @@ def index_tp_link_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -290945,8 +283661,7 @@ def index_tp_link_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -291004,10 +283719,8 @@ def index_tp_link_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -291061,7 +283774,6 @@ def index_tp_link_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -291106,7 +283818,6 @@ def _index_tp_link_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -291207,10 +283918,6 @@ def _index_tp_link_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -291292,8 +283999,7 @@ def index_trane_technology_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -291351,10 +284057,8 @@ def index_trane_technology_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -291408,7 +284112,6 @@ def index_trane_technology_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -291457,8 +284160,7 @@ def index_trane_technology_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -291516,10 +284218,8 @@ def index_trane_technology_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -291573,7 +284273,6 @@ def index_trane_technology_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -291622,8 +284321,7 @@ def index_trane_technology_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -291681,10 +284379,8 @@ def index_trane_technology_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -291738,7 +284434,6 @@ def index_trane_technology_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -291783,7 +284478,6 @@ def _index_trane_technology_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -291884,10 +284578,6 @@ def _index_trane_technology_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -291969,8 +284659,7 @@ def index_trendmicro_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292028,10 +284717,8 @@ def index_trendmicro_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292085,7 +284772,6 @@ def index_trendmicro_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292134,8 +284820,7 @@ def index_trendmicro_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292193,10 +284878,8 @@ def index_trendmicro_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292250,7 +284933,6 @@ def index_trendmicro_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292299,8 +284981,7 @@ def index_trendmicro_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292358,10 +285039,8 @@ def index_trendmicro_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292415,7 +285094,6 @@ def index_trendmicro_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292460,7 +285138,6 @@ def _index_trendmicro_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -292561,10 +285238,6 @@ def _index_trendmicro_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -292646,8 +285319,7 @@ def index_trustwave_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292705,10 +285377,8 @@ def index_trustwave_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292762,7 +285432,6 @@ def index_trustwave_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292811,8 +285480,7 @@ def index_trustwave_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -292870,10 +285538,8 @@ def index_trustwave_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -292927,7 +285593,6 @@ def index_trustwave_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -292976,8 +285641,7 @@ def index_trustwave_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -293035,10 +285699,8 @@ def index_trustwave_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -293092,7 +285754,6 @@ def index_trustwave_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -293137,7 +285798,6 @@ def _index_trustwave_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -293238,10 +285898,6 @@ def _index_trustwave_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -293323,8 +285979,7 @@ def index_twcert_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -293382,10 +286037,8 @@ def index_twcert_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -293439,7 +286092,6 @@ def index_twcert_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -293488,8 +286140,7 @@ def index_twcert_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -293547,10 +286198,8 @@ def index_twcert_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -293604,7 +286253,6 @@ def index_twcert_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -293653,8 +286301,7 @@ def index_twcert_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -293712,10 +286359,8 @@ def index_twcert_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -293769,7 +286414,6 @@ def index_twcert_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -293814,7 +286458,6 @@ def _index_twcert_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -293915,10 +286558,6 @@ def _index_twcert_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -294000,8 +286639,7 @@ def index_ubiquiti_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294059,10 +286697,8 @@ def index_ubiquiti_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294116,7 +286752,6 @@ def index_ubiquiti_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -294165,8 +286800,7 @@ def index_ubiquiti_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294224,10 +286858,8 @@ def index_ubiquiti_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294281,7 +286913,6 @@ def index_ubiquiti_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -294330,8 +286961,7 @@ def index_ubiquiti_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294389,10 +287019,8 @@ def index_ubiquiti_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294446,7 +287074,6 @@ def index_ubiquiti_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -294491,7 +287118,6 @@ def _index_ubiquiti_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -294592,10 +287218,6 @@ def _index_ubiquiti_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -294677,8 +287299,7 @@ def index_ubuntu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294736,10 +287357,8 @@ def index_ubuntu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294793,7 +287412,6 @@ def index_ubuntu_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -294842,8 +287460,7 @@ def index_ubuntu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -294901,10 +287518,8 @@ def index_ubuntu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -294958,7 +287573,6 @@ def index_ubuntu_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295007,8 +287621,7 @@ def index_ubuntu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -295066,10 +287679,8 @@ def index_ubuntu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -295123,7 +287734,6 @@ def index_ubuntu_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295168,7 +287778,6 @@ def _index_ubuntu_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -295269,10 +287878,6 @@ def _index_ubuntu_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -295354,8 +287959,7 @@ def index_ubuntu_purls_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -295413,10 +288017,8 @@ def index_ubuntu_purls_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -295470,7 +288072,6 @@ def index_ubuntu_purls_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295519,8 +288120,7 @@ def index_ubuntu_purls_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -295578,10 +288178,8 @@ def index_ubuntu_purls_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -295635,7 +288233,6 @@ def index_ubuntu_purls_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295684,8 +288281,7 @@ def index_ubuntu_purls_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -295743,10 +288339,8 @@ def index_ubuntu_purls_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -295800,7 +288394,6 @@ def index_ubuntu_purls_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -295845,7 +288438,6 @@ def _index_ubuntu_purls_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -295946,10 +288538,6 @@ def _index_ubuntu_purls_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -296031,8 +288619,7 @@ def index_unify_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296090,10 +288677,8 @@ def index_unify_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296147,7 +288732,6 @@ def index_unify_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -296196,8 +288780,7 @@ def index_unify_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296255,10 +288838,8 @@ def index_unify_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296312,7 +288893,6 @@ def index_unify_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -296361,8 +288941,7 @@ def index_unify_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296420,10 +288999,8 @@ def index_unify_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296477,7 +289054,6 @@ def index_unify_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -296522,7 +289098,6 @@ def _index_unify_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -296623,10 +289198,6 @@ def _index_unify_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -296708,8 +289279,7 @@ def index_unisoc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296767,10 +289337,8 @@ def index_unisoc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296824,7 +289392,6 @@ def index_unisoc_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -296873,8 +289440,7 @@ def index_unisoc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -296932,10 +289498,8 @@ def index_unisoc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -296989,7 +289553,6 @@ def index_unisoc_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297038,8 +289601,7 @@ def index_unisoc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -297097,10 +289659,8 @@ def index_unisoc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -297154,7 +289714,6 @@ def index_unisoc_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297199,7 +289758,6 @@ def _index_unisoc_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -297300,10 +289858,6 @@ def _index_unisoc_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -297385,8 +289939,7 @@ def index_usd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -297444,10 +289997,8 @@ def index_usd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -297501,7 +290052,6 @@ def index_usd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297550,8 +290100,7 @@ def index_usd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -297609,10 +290158,8 @@ def index_usd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -297666,7 +290213,6 @@ def index_usd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297715,8 +290261,7 @@ def index_usd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -297774,10 +290319,8 @@ def index_usd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -297831,7 +290374,6 @@ def index_usd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -297876,7 +290418,6 @@ def _index_usd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -297977,10 +290518,6 @@ def _index_usd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -298062,8 +290599,7 @@ def index_usom_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298121,10 +290657,8 @@ def index_usom_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -298178,7 +290712,6 @@ def index_usom_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -298227,8 +290760,7 @@ def index_usom_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298286,10 +290818,8 @@ def index_usom_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -298343,7 +290873,6 @@ def index_usom_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -298392,8 +290921,7 @@ def index_usom_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298451,10 +290979,8 @@ def index_usom_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -298508,7 +291034,6 @@ def index_usom_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -298553,7 +291078,6 @@ def _index_usom_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -298654,10 +291178,6 @@ def _index_usom_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -298739,8 +291259,7 @@ def index_vandyke_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298798,10 +291317,8 @@ def index_vandyke_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -298855,7 +291372,6 @@ def index_vandyke_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -298904,8 +291420,7 @@ def index_vandyke_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -298963,10 +291478,8 @@ def index_vandyke_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299020,7 +291533,6 @@ def index_vandyke_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299069,8 +291581,7 @@ def index_vandyke_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -299128,10 +291639,8 @@ def index_vandyke_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299185,7 +291694,6 @@ def index_vandyke_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299230,7 +291738,6 @@ def _index_vandyke_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -299331,10 +291838,6 @@ def _index_vandyke_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -299416,8 +291919,7 @@ def index_vapidlabs_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -299475,10 +291977,8 @@ def index_vapidlabs_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299532,7 +292032,6 @@ def index_vapidlabs_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299581,8 +292080,7 @@ def index_vapidlabs_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -299640,10 +292138,8 @@ def index_vapidlabs_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299697,7 +292193,6 @@ def index_vapidlabs_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299746,8 +292241,7 @@ def index_vapidlabs_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -299805,10 +292299,8 @@ def index_vapidlabs_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -299862,7 +292354,6 @@ def index_vapidlabs_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -299907,7 +292398,6 @@ def _index_vapidlabs_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -300008,10 +292498,6 @@ def _index_vapidlabs_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -300093,8 +292579,7 @@ def index_vc_cpe_dictionary_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300152,10 +292637,8 @@ def index_vc_cpe_dictionary_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -300209,7 +292692,6 @@ def index_vc_cpe_dictionary_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -300258,8 +292740,7 @@ def index_vc_cpe_dictionary_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300317,10 +292798,8 @@ def index_vc_cpe_dictionary_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -300374,7 +292853,6 @@ def index_vc_cpe_dictionary_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -300423,8 +292901,7 @@ def index_vc_cpe_dictionary_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300482,10 +292959,8 @@ def index_vc_cpe_dictionary_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -300539,7 +293014,6 @@ def index_vc_cpe_dictionary_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -300584,7 +293058,6 @@ def _index_vc_cpe_dictionary_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -300685,10 +293158,6 @@ def _index_vc_cpe_dictionary_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -300770,8 +293239,7 @@ def index_vde_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300829,10 +293297,8 @@ def index_vde_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -300886,7 +293352,6 @@ def index_vde_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -300935,8 +293400,7 @@ def index_vde_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -300994,10 +293458,8 @@ def index_vde_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301051,7 +293513,6 @@ def index_vde_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301100,8 +293561,7 @@ def index_vde_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -301159,10 +293619,8 @@ def index_vde_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301216,7 +293674,6 @@ def index_vde_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301261,7 +293718,6 @@ def _index_vde_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -301362,10 +293818,6 @@ def _index_vde_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -301447,8 +293899,7 @@ def index_veeam_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -301506,10 +293957,8 @@ def index_veeam_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301563,7 +294012,6 @@ def index_veeam_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301612,8 +294060,7 @@ def index_veeam_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -301671,10 +294118,8 @@ def index_veeam_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301728,7 +294173,6 @@ def index_veeam_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301777,8 +294221,7 @@ def index_veeam_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -301836,10 +294279,8 @@ def index_veeam_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -301893,7 +294334,6 @@ def index_veeam_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -301938,7 +294378,6 @@ def _index_veeam_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -302039,10 +294478,6 @@ def _index_veeam_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -302124,8 +294559,7 @@ def index_veritas_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302183,10 +294617,8 @@ def index_veritas_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -302240,7 +294672,6 @@ def index_veritas_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -302289,8 +294720,7 @@ def index_veritas_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302348,10 +294778,8 @@ def index_veritas_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -302405,7 +294833,6 @@ def index_veritas_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -302454,8 +294881,7 @@ def index_veritas_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302513,10 +294939,8 @@ def index_veritas_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -302570,7 +294994,6 @@ def index_veritas_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -302615,7 +295038,6 @@ def _index_veritas_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -302716,10 +295138,6 @@ def _index_veritas_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -302801,8 +295219,7 @@ def index_virtuozzo_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -302860,10 +295277,8 @@ def index_virtuozzo_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -302917,7 +295332,6 @@ def index_virtuozzo_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -302966,8 +295380,7 @@ def index_virtuozzo_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303025,10 +295438,8 @@ def index_virtuozzo_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303082,7 +295493,6 @@ def index_virtuozzo_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303131,8 +295541,7 @@ def index_virtuozzo_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303190,10 +295599,8 @@ def index_virtuozzo_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303247,7 +295654,6 @@ def index_virtuozzo_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303292,7 +295698,6 @@ def _index_virtuozzo_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -303393,10 +295798,6 @@ def _index_virtuozzo_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -303478,8 +295879,7 @@ def index_vlc_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303537,10 +295937,8 @@ def index_vlc_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303594,7 +295992,6 @@ def index_vlc_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303643,8 +296040,7 @@ def index_vlc_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303702,10 +296098,8 @@ def index_vlc_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303759,7 +296153,6 @@ def index_vlc_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303808,8 +296201,7 @@ def index_vlc_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -303867,10 +296259,8 @@ def index_vlc_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -303924,7 +296314,6 @@ def index_vlc_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -303969,7 +296358,6 @@ def _index_vlc_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -304070,10 +296458,6 @@ def _index_vlc_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -304155,8 +296539,7 @@ def index_vmware_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -304214,10 +296597,8 @@ def index_vmware_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -304271,7 +296652,6 @@ def index_vmware_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -304320,8 +296700,7 @@ def index_vmware_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -304379,10 +296758,8 @@ def index_vmware_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -304436,7 +296813,6 @@ def index_vmware_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -304485,8 +296861,7 @@ def index_vmware_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -304544,10 +296919,8 @@ def index_vmware_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -304601,7 +296974,6 @@ def index_vmware_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -304646,7 +297018,6 @@ def _index_vmware_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -304747,10 +297118,6 @@ def _index_vmware_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -304832,8 +297199,7 @@ def index_voidsec_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -304891,10 +297257,8 @@ def index_voidsec_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -304948,7 +297312,6 @@ def index_voidsec_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -304997,8 +297360,7 @@ def index_voidsec_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305056,10 +297418,8 @@ def index_voidsec_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305113,7 +297473,6 @@ def index_voidsec_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305162,8 +297521,7 @@ def index_voidsec_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305221,10 +297579,8 @@ def index_voidsec_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305278,7 +297634,6 @@ def index_voidsec_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305323,7 +297678,6 @@ def _index_voidsec_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -305424,10 +297778,6 @@ def _index_voidsec_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -305502,8 +297852,8 @@ def index_vulncheck_canaries10d_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305547,10 +297897,10 @@ def index_vulncheck_canaries10d_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305596,8 +297946,8 @@ def index_vulncheck_canaries10d_get( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305639,8 +297989,8 @@ def index_vulncheck_canaries10d_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305684,10 +298034,10 @@ def index_vulncheck_canaries10d_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305733,8 +298083,8 @@ def index_vulncheck_canaries10d_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305776,8 +298126,8 @@ def index_vulncheck_canaries10d_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -305821,10 +298171,10 @@ def index_vulncheck_canaries10d_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -305870,8 +298220,8 @@ def index_vulncheck_canaries10d_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -305908,8 +298258,8 @@ def _index_vulncheck_canaries10d_get_serialize( published, src_country, dst_country, + src_ip, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -305978,13 +298328,13 @@ def _index_vulncheck_canaries10d_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if var_date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', var_date)) if updated_at_start_date is not None: @@ -306060,8 +298410,8 @@ def index_vulncheck_canaries30d_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306105,10 +298455,10 @@ def index_vulncheck_canaries30d_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306154,8 +298504,8 @@ def index_vulncheck_canaries30d_get( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306197,8 +298547,8 @@ def index_vulncheck_canaries30d_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306242,10 +298592,10 @@ def index_vulncheck_canaries30d_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306291,8 +298641,8 @@ def index_vulncheck_canaries30d_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306334,8 +298684,8 @@ def index_vulncheck_canaries30d_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306379,10 +298729,10 @@ def index_vulncheck_canaries30d_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306428,8 +298778,8 @@ def index_vulncheck_canaries30d_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306466,8 +298816,8 @@ def _index_vulncheck_canaries30d_get_serialize( published, src_country, dst_country, + src_ip, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -306536,13 +298886,13 @@ def _index_vulncheck_canaries30d_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if var_date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', var_date)) if updated_at_start_date is not None: @@ -306618,8 +298968,8 @@ def index_vulncheck_canaries3d_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306663,10 +299013,10 @@ def index_vulncheck_canaries3d_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306712,8 +299062,8 @@ def index_vulncheck_canaries3d_get( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306755,8 +299105,8 @@ def index_vulncheck_canaries3d_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306800,10 +299150,10 @@ def index_vulncheck_canaries3d_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306849,8 +299199,8 @@ def index_vulncheck_canaries3d_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -306892,8 +299242,8 @@ def index_vulncheck_canaries3d_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -306937,10 +299287,10 @@ def index_vulncheck_canaries3d_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -306986,8 +299336,8 @@ def index_vulncheck_canaries3d_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307024,8 +299374,8 @@ def _index_vulncheck_canaries3d_get_serialize( published, src_country, dst_country, + src_ip, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -307094,13 +299444,13 @@ def _index_vulncheck_canaries3d_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if var_date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', var_date)) if updated_at_start_date is not None: @@ -307176,8 +299526,8 @@ def index_vulncheck_canaries90d_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307221,10 +299571,10 @@ def index_vulncheck_canaries90d_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307270,8 +299620,8 @@ def index_vulncheck_canaries90d_get( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307313,8 +299663,8 @@ def index_vulncheck_canaries90d_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307358,10 +299708,10 @@ def index_vulncheck_canaries90d_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307407,8 +299757,8 @@ def index_vulncheck_canaries90d_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307450,8 +299800,8 @@ def index_vulncheck_canaries90d_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307495,10 +299845,10 @@ def index_vulncheck_canaries90d_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307544,8 +299894,8 @@ def index_vulncheck_canaries90d_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307582,8 +299932,8 @@ def _index_vulncheck_canaries90d_get_serialize( published, src_country, dst_country, + src_ip, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -307652,13 +300002,13 @@ def _index_vulncheck_canaries90d_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if var_date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', var_date)) if updated_at_start_date is not None: @@ -307734,8 +300084,8 @@ def index_vulncheck_canaries_get( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307779,10 +300129,10 @@ def index_vulncheck_canaries_get( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307828,8 +300178,8 @@ def index_vulncheck_canaries_get( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -307871,8 +300221,8 @@ def index_vulncheck_canaries_get_with_http_info( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -307916,10 +300266,10 @@ def index_vulncheck_canaries_get_with_http_info( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -307965,8 +300315,8 @@ def index_vulncheck_canaries_get_with_http_info( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308008,8 +300358,8 @@ def index_vulncheck_canaries_get_without_preload_content( published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, src_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, dst_country: Annotated[Optional[StrictStr], Field(description="Country code in ISO-3166 format")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + src_ip: Annotated[Optional[StrictStr], Field(description="Source IP address")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308053,10 +300403,10 @@ def index_vulncheck_canaries_get_without_preload_content( :type src_country: str :param dst_country: Country code in ISO-3166 format :type dst_country: str - :param var_date: Specify a starting published date to filter with. + :param src_ip: Source IP address + :type src_ip: str + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -308102,8 +300452,8 @@ def index_vulncheck_canaries_get_without_preload_content( published=published, src_country=src_country, dst_country=dst_country, + src_ip=src_ip, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308140,8 +300490,8 @@ def _index_vulncheck_canaries_get_serialize( published, src_country, dst_country, + src_ip, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -308210,13 +300560,13 @@ def _index_vulncheck_canaries_get_serialize( _query_params.append(('dst_country', dst_country)) - if var_date is not None: + if src_ip is not None: - _query_params.append(('date', var_date)) + _query_params.append(('src_ip', src_ip)) - if var_date2 is not None: + if var_date is not None: - _query_params.append(('date', var_date2)) + _query_params.append(('date', var_date)) if updated_at_start_date is not None: @@ -308299,8 +300649,7 @@ def index_vulncheck_config_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308358,10 +300707,8 @@ def index_vulncheck_config_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -308415,7 +300762,6 @@ def index_vulncheck_config_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308464,8 +300810,7 @@ def index_vulncheck_config_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308523,10 +300868,8 @@ def index_vulncheck_config_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -308580,7 +300923,6 @@ def index_vulncheck_config_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308629,8 +300971,7 @@ def index_vulncheck_config_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -308688,10 +301029,8 @@ def index_vulncheck_config_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -308745,7 +301084,6 @@ def index_vulncheck_config_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -308790,7 +301128,6 @@ def _index_vulncheck_config_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -308891,10 +301228,6 @@ def _index_vulncheck_config_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -308976,8 +301309,7 @@ def index_vulncheck_cvelist_v5_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309035,10 +301367,8 @@ def index_vulncheck_cvelist_v5_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309092,7 +301422,6 @@ def index_vulncheck_cvelist_v5_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309141,8 +301470,7 @@ def index_vulncheck_cvelist_v5_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309200,10 +301528,8 @@ def index_vulncheck_cvelist_v5_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309257,7 +301583,6 @@ def index_vulncheck_cvelist_v5_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309306,8 +301631,7 @@ def index_vulncheck_cvelist_v5_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309365,10 +301689,8 @@ def index_vulncheck_cvelist_v5_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309422,7 +301744,6 @@ def index_vulncheck_cvelist_v5_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309467,7 +301788,6 @@ def _index_vulncheck_cvelist_v5_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -309568,10 +301888,6 @@ def _index_vulncheck_cvelist_v5_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -309653,8 +301969,7 @@ def index_vulncheck_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309712,10 +302027,8 @@ def index_vulncheck_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309769,7 +302082,6 @@ def index_vulncheck_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309818,8 +302130,7 @@ def index_vulncheck_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -309877,10 +302188,8 @@ def index_vulncheck_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -309934,7 +302243,6 @@ def index_vulncheck_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -309983,8 +302291,7 @@ def index_vulncheck_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -310042,10 +302349,8 @@ def index_vulncheck_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -310099,7 +302404,6 @@ def index_vulncheck_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -310144,7 +302448,6 @@ def _index_vulncheck_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -310245,10 +302548,6 @@ def _index_vulncheck_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -310330,8 +302629,7 @@ def index_vulncheck_kev_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -310389,10 +302687,8 @@ def index_vulncheck_kev_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -310446,7 +302742,6 @@ def index_vulncheck_kev_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -310495,8 +302790,7 @@ def index_vulncheck_kev_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -310554,10 +302848,8 @@ def index_vulncheck_kev_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -310611,7 +302903,6 @@ def index_vulncheck_kev_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -310660,8 +302951,7 @@ def index_vulncheck_kev_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -310719,10 +303009,8 @@ def index_vulncheck_kev_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -310776,7 +303064,6 @@ def index_vulncheck_kev_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -310821,7 +303108,6 @@ def _index_vulncheck_kev_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -310922,10 +303208,6 @@ def _index_vulncheck_kev_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -311007,8 +303289,7 @@ def index_vulncheck_nvd2_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311066,10 +303347,8 @@ def index_vulncheck_nvd2_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311123,7 +303402,6 @@ def index_vulncheck_nvd2_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -311172,8 +303450,7 @@ def index_vulncheck_nvd2_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311231,10 +303508,8 @@ def index_vulncheck_nvd2_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311288,7 +303563,6 @@ def index_vulncheck_nvd2_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -311337,8 +303611,7 @@ def index_vulncheck_nvd2_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311396,10 +303669,8 @@ def index_vulncheck_nvd2_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311453,7 +303724,6 @@ def index_vulncheck_nvd2_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -311498,7 +303768,6 @@ def _index_vulncheck_nvd2_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -311599,10 +303868,6 @@ def _index_vulncheck_nvd2_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -311684,8 +303949,7 @@ def index_vulncheck_nvd_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311743,10 +304007,8 @@ def index_vulncheck_nvd_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311800,7 +304062,6 @@ def index_vulncheck_nvd_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -311849,8 +304110,7 @@ def index_vulncheck_nvd_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -311908,10 +304168,8 @@ def index_vulncheck_nvd_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -311965,7 +304223,6 @@ def index_vulncheck_nvd_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312014,8 +304271,7 @@ def index_vulncheck_nvd_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -312073,10 +304329,8 @@ def index_vulncheck_nvd_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -312130,7 +304384,6 @@ def index_vulncheck_nvd_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312175,7 +304428,6 @@ def _index_vulncheck_nvd_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -312276,10 +304528,6 @@ def _index_vulncheck_nvd_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -312361,8 +304609,7 @@ def index_vulnerability_aliases_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -312420,10 +304667,8 @@ def index_vulnerability_aliases_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -312477,7 +304722,6 @@ def index_vulnerability_aliases_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312526,8 +304770,7 @@ def index_vulnerability_aliases_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -312585,10 +304828,8 @@ def index_vulnerability_aliases_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -312642,7 +304883,6 @@ def index_vulnerability_aliases_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312691,8 +304931,7 @@ def index_vulnerability_aliases_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -312750,10 +304989,8 @@ def index_vulnerability_aliases_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -312807,7 +305044,6 @@ def index_vulnerability_aliases_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -312852,7 +305088,6 @@ def _index_vulnerability_aliases_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -312953,10 +305188,6 @@ def _index_vulnerability_aliases_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -313038,8 +305269,7 @@ def index_vulnrichment_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313097,10 +305327,8 @@ def index_vulnrichment_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313154,7 +305382,6 @@ def index_vulnrichment_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -313203,8 +305430,7 @@ def index_vulnrichment_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313262,10 +305488,8 @@ def index_vulnrichment_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313319,7 +305543,6 @@ def index_vulnrichment_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -313368,8 +305591,7 @@ def index_vulnrichment_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313427,10 +305649,8 @@ def index_vulnrichment_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313484,7 +305704,6 @@ def index_vulnrichment_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -313529,7 +305748,6 @@ def _index_vulnrichment_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -313630,10 +305848,6 @@ def _index_vulnrichment_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -313715,8 +305929,7 @@ def index_vyaire_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313774,10 +305987,8 @@ def index_vyaire_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313831,7 +306042,6 @@ def index_vyaire_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -313880,8 +306090,7 @@ def index_vyaire_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -313939,10 +306148,8 @@ def index_vyaire_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -313996,7 +306203,6 @@ def index_vyaire_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314045,8 +306251,7 @@ def index_vyaire_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -314104,10 +306309,8 @@ def index_vyaire_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -314161,7 +306364,6 @@ def index_vyaire_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314206,7 +306408,6 @@ def _index_vyaire_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -314307,10 +306508,6 @@ def _index_vyaire_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -314392,8 +306589,7 @@ def index_watchguard_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -314451,10 +306647,8 @@ def index_watchguard_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -314508,7 +306702,6 @@ def index_watchguard_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314557,8 +306750,7 @@ def index_watchguard_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -314616,10 +306808,8 @@ def index_watchguard_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -314673,7 +306863,6 @@ def index_watchguard_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314722,8 +306911,7 @@ def index_watchguard_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -314781,10 +306969,8 @@ def index_watchguard_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -314838,7 +307024,6 @@ def index_watchguard_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -314883,7 +307068,6 @@ def _index_watchguard_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -314984,10 +307168,6 @@ def _index_watchguard_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -315069,8 +307249,7 @@ def index_whatsapp_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315128,10 +307307,8 @@ def index_whatsapp_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -315185,7 +307362,6 @@ def index_whatsapp_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -315234,8 +307410,7 @@ def index_whatsapp_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315293,10 +307468,8 @@ def index_whatsapp_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -315350,7 +307523,6 @@ def index_whatsapp_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -315399,8 +307571,7 @@ def index_whatsapp_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315458,10 +307629,8 @@ def index_whatsapp_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -315515,7 +307684,6 @@ def index_whatsapp_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -315560,7 +307728,6 @@ def _index_whatsapp_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -315661,10 +307828,6 @@ def _index_whatsapp_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -315746,8 +307909,7 @@ def index_wibu_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315805,10 +307967,8 @@ def index_wibu_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -315862,7 +308022,6 @@ def index_wibu_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -315911,8 +308070,7 @@ def index_wibu_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -315970,10 +308128,8 @@ def index_wibu_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316027,7 +308183,6 @@ def index_wibu_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316076,8 +308231,7 @@ def index_wibu_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -316135,10 +308289,8 @@ def index_wibu_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316192,7 +308344,6 @@ def index_wibu_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316237,7 +308388,6 @@ def _index_wibu_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -316338,10 +308488,6 @@ def _index_wibu_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -316423,8 +308569,7 @@ def index_wireshark_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -316482,10 +308627,8 @@ def index_wireshark_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316539,7 +308682,6 @@ def index_wireshark_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316588,8 +308730,7 @@ def index_wireshark_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -316647,10 +308788,8 @@ def index_wireshark_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316704,7 +308843,6 @@ def index_wireshark_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316753,8 +308891,7 @@ def index_wireshark_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -316812,10 +308949,8 @@ def index_wireshark_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -316869,7 +309004,6 @@ def index_wireshark_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -316914,7 +309048,6 @@ def _index_wireshark_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -317015,10 +309148,6 @@ def _index_wireshark_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -317100,8 +309229,7 @@ def index_with_secure_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317159,10 +309287,8 @@ def index_with_secure_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -317216,7 +309342,6 @@ def index_with_secure_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -317265,8 +309390,7 @@ def index_with_secure_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317324,10 +309448,8 @@ def index_with_secure_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -317381,7 +309503,6 @@ def index_with_secure_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -317430,8 +309551,7 @@ def index_with_secure_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317489,10 +309609,8 @@ def index_with_secure_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -317546,7 +309664,6 @@ def index_with_secure_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -317591,7 +309708,6 @@ def _index_with_secure_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -317692,10 +309808,6 @@ def _index_with_secure_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -317777,8 +309889,7 @@ def index_wolfi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -317836,10 +309947,8 @@ def index_wolfi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -317893,7 +310002,6 @@ def index_wolfi_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -317942,8 +310050,7 @@ def index_wolfi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318001,10 +310108,8 @@ def index_wolfi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318058,7 +310163,6 @@ def index_wolfi_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318107,8 +310211,7 @@ def index_wolfi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318166,10 +310269,8 @@ def index_wolfi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318223,7 +310324,6 @@ def index_wolfi_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318268,7 +310368,6 @@ def _index_wolfi_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -318369,10 +310468,6 @@ def _index_wolfi_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -318454,8 +310549,7 @@ def index_wolfssl_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318513,10 +310607,8 @@ def index_wolfssl_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318570,7 +310662,6 @@ def index_wolfssl_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318619,8 +310710,7 @@ def index_wolfssl_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318678,10 +310768,8 @@ def index_wolfssl_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318735,7 +310823,6 @@ def index_wolfssl_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318784,8 +310871,7 @@ def index_wolfssl_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -318843,10 +310929,8 @@ def index_wolfssl_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -318900,7 +310984,6 @@ def index_wolfssl_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -318945,7 +311028,6 @@ def _index_wolfssl_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -319046,10 +311128,6 @@ def _index_wolfssl_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -319131,8 +311209,7 @@ def index_wordfence_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319190,10 +311267,8 @@ def index_wordfence_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -319247,7 +311322,6 @@ def index_wordfence_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -319296,8 +311370,7 @@ def index_wordfence_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319355,10 +311428,8 @@ def index_wordfence_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -319412,7 +311483,6 @@ def index_wordfence_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -319461,8 +311531,7 @@ def index_wordfence_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319520,10 +311589,8 @@ def index_wordfence_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -319577,7 +311644,6 @@ def index_wordfence_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -319622,7 +311688,6 @@ def _index_wordfence_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -319723,10 +311788,6 @@ def _index_wordfence_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -319808,8 +311869,7 @@ def index_xen_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -319867,10 +311927,8 @@ def index_xen_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -319924,7 +311982,6 @@ def index_xen_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -319973,8 +312030,7 @@ def index_xen_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320032,10 +312088,8 @@ def index_xen_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320089,7 +312143,6 @@ def index_xen_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320138,8 +312191,7 @@ def index_xen_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320197,10 +312249,8 @@ def index_xen_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320254,7 +312304,6 @@ def index_xen_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320299,7 +312348,6 @@ def _index_xen_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -320400,10 +312448,6 @@ def _index_xen_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -320485,8 +312529,7 @@ def index_xerox_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320544,10 +312587,8 @@ def index_xerox_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320601,7 +312642,6 @@ def index_xerox_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320650,8 +312690,7 @@ def index_xerox_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320709,10 +312748,8 @@ def index_xerox_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320766,7 +312803,6 @@ def index_xerox_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320815,8 +312851,7 @@ def index_xerox_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -320874,10 +312909,8 @@ def index_xerox_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -320931,7 +312964,6 @@ def index_xerox_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -320976,7 +313008,6 @@ def _index_xerox_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -321077,10 +313108,6 @@ def _index_xerox_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -321162,8 +313189,7 @@ def index_xiaomi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -321221,10 +313247,8 @@ def index_xiaomi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -321278,7 +313302,6 @@ def index_xiaomi_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -321327,8 +313350,7 @@ def index_xiaomi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -321386,10 +313408,8 @@ def index_xiaomi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -321443,7 +313463,6 @@ def index_xiaomi_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -321492,8 +313511,7 @@ def index_xiaomi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -321551,10 +313569,8 @@ def index_xiaomi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -321608,7 +313624,6 @@ def index_xiaomi_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -321653,7 +313668,6 @@ def _index_xiaomi_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -321754,10 +313768,6 @@ def _index_xiaomi_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -321839,8 +313849,7 @@ def index_xylem_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -321898,10 +313907,8 @@ def index_xylem_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -321955,7 +313962,6 @@ def index_xylem_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322004,8 +314010,7 @@ def index_xylem_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322063,10 +314068,8 @@ def index_xylem_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322120,7 +314123,6 @@ def index_xylem_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322169,8 +314171,7 @@ def index_xylem_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322228,10 +314229,8 @@ def index_xylem_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322285,7 +314284,6 @@ def index_xylem_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322330,7 +314328,6 @@ def _index_xylem_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -322431,10 +314428,6 @@ def _index_xylem_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -322516,8 +314509,7 @@ def index_yamaha_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322575,10 +314567,8 @@ def index_yamaha_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322632,7 +314622,6 @@ def index_yamaha_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322681,8 +314670,7 @@ def index_yamaha_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322740,10 +314728,8 @@ def index_yamaha_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322797,7 +314783,6 @@ def index_yamaha_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -322846,8 +314831,7 @@ def index_yamaha_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -322905,10 +314889,8 @@ def index_yamaha_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -322962,7 +314944,6 @@ def index_yamaha_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -323007,7 +314988,6 @@ def _index_yamaha_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -323108,10 +315088,6 @@ def _index_yamaha_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -323193,8 +315169,7 @@ def index_yokogawa_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -323252,10 +315227,8 @@ def index_yokogawa_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -323309,7 +315282,6 @@ def index_yokogawa_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -323358,8 +315330,7 @@ def index_yokogawa_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -323417,10 +315388,8 @@ def index_yokogawa_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -323474,7 +315443,6 @@ def index_yokogawa_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -323523,8 +315491,7 @@ def index_yokogawa_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -323582,10 +315549,8 @@ def index_yokogawa_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -323639,7 +315604,6 @@ def index_yokogawa_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -323684,7 +315648,6 @@ def _index_yokogawa_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -323785,10 +315748,6 @@ def _index_yokogawa_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -323870,8 +315829,7 @@ def index_yubico_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -323929,10 +315887,8 @@ def index_yubico_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -323986,7 +315942,6 @@ def index_yubico_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324035,8 +315990,7 @@ def index_yubico_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324094,10 +316048,8 @@ def index_yubico_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324151,7 +316103,6 @@ def index_yubico_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324200,8 +316151,7 @@ def index_yubico_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324259,10 +316209,8 @@ def index_yubico_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324316,7 +316264,6 @@ def index_yubico_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324361,7 +316308,6 @@ def _index_yubico_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -324462,10 +316408,6 @@ def _index_yubico_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -324547,8 +316489,7 @@ def index_zdi_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324606,10 +316547,8 @@ def index_zdi_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324663,7 +316602,6 @@ def index_zdi_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324712,8 +316650,7 @@ def index_zdi_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324771,10 +316708,8 @@ def index_zdi_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324828,7 +316763,6 @@ def index_zdi_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -324877,8 +316811,7 @@ def index_zdi_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -324936,10 +316869,8 @@ def index_zdi_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -324993,7 +316924,6 @@ def index_zdi_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -325038,7 +316968,6 @@ def _index_zdi_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -325139,10 +317068,6 @@ def _index_zdi_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -325224,8 +317149,7 @@ def index_zebra_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -325283,10 +317207,8 @@ def index_zebra_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -325340,7 +317262,6 @@ def index_zebra_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -325389,8 +317310,7 @@ def index_zebra_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -325448,10 +317368,8 @@ def index_zebra_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -325505,7 +317423,6 @@ def index_zebra_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -325554,8 +317471,7 @@ def index_zebra_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -325613,10 +317529,8 @@ def index_zebra_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -325670,7 +317584,6 @@ def index_zebra_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -325715,7 +317628,6 @@ def _index_zebra_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -325816,10 +317728,6 @@ def _index_zebra_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -325901,8 +317809,7 @@ def index_zeroscience_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -325960,10 +317867,8 @@ def index_zeroscience_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326017,7 +317922,6 @@ def index_zeroscience_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326066,8 +317970,7 @@ def index_zeroscience_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326125,10 +318028,8 @@ def index_zeroscience_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326182,7 +318083,6 @@ def index_zeroscience_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326231,8 +318131,7 @@ def index_zeroscience_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326290,10 +318189,8 @@ def index_zeroscience_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326347,7 +318244,6 @@ def index_zeroscience_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326392,7 +318288,6 @@ def _index_zeroscience_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -326493,10 +318388,6 @@ def _index_zeroscience_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -326578,8 +318469,7 @@ def index_zimbra_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326637,10 +318527,8 @@ def index_zimbra_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326694,7 +318582,6 @@ def index_zimbra_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326743,8 +318630,7 @@ def index_zimbra_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326802,10 +318688,8 @@ def index_zimbra_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -326859,7 +318743,6 @@ def index_zimbra_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -326908,8 +318791,7 @@ def index_zimbra_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -326967,10 +318849,8 @@ def index_zimbra_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -327024,7 +318904,6 @@ def index_zimbra_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -327069,7 +318948,6 @@ def _index_zimbra_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -327170,10 +319048,6 @@ def _index_zimbra_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -327255,8 +319129,7 @@ def index_zoom_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -327314,10 +319187,8 @@ def index_zoom_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -327371,7 +319242,6 @@ def index_zoom_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -327420,8 +319290,7 @@ def index_zoom_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -327479,10 +319348,8 @@ def index_zoom_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -327536,7 +319403,6 @@ def index_zoom_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -327585,8 +319451,7 @@ def index_zoom_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -327644,10 +319509,8 @@ def index_zoom_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -327701,7 +319564,6 @@ def index_zoom_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -327746,7 +319608,6 @@ def _index_zoom_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -327847,10 +319708,6 @@ def _index_zoom_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -327932,8 +319789,7 @@ def index_zscaler_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -327991,10 +319847,8 @@ def index_zscaler_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328048,7 +319902,6 @@ def index_zscaler_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328097,8 +319950,7 @@ def index_zscaler_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328156,10 +320008,8 @@ def index_zscaler_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328213,7 +320063,6 @@ def index_zscaler_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328262,8 +320111,7 @@ def index_zscaler_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328321,10 +320169,8 @@ def index_zscaler_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328378,7 +320224,6 @@ def index_zscaler_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328423,7 +320268,6 @@ def _index_zscaler_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -328524,10 +320368,6 @@ def _index_zscaler_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -328609,8 +320449,7 @@ def index_zuso_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328668,10 +320507,8 @@ def index_zuso_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328725,7 +320562,6 @@ def index_zuso_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328774,8 +320610,7 @@ def index_zuso_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328833,10 +320668,8 @@ def index_zuso_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -328890,7 +320723,6 @@ def index_zuso_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -328939,8 +320771,7 @@ def index_zuso_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -328998,10 +320829,8 @@ def index_zuso_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -329055,7 +320884,6 @@ def index_zuso_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -329100,7 +320928,6 @@ def _index_zuso_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -329201,10 +321028,6 @@ def _index_zuso_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) @@ -329286,8 +321109,7 @@ def index_zyxel_get( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -329345,10 +321167,8 @@ def index_zyxel_get( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -329402,7 +321222,6 @@ def index_zyxel_get( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -329451,8 +321270,7 @@ def index_zyxel_get_with_http_info( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -329510,10 +321328,8 @@ def index_zyxel_get_with_http_info( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -329567,7 +321383,6 @@ def index_zyxel_get_with_http_info( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -329616,8 +321431,7 @@ def index_zyxel_get_without_preload_content( ransomware: Annotated[Optional[StrictStr], Field(description="Specify a ransomeware family name to search with.")] = None, botnet: Annotated[Optional[StrictStr], Field(description="Specify a botnet name to search with.")] = None, published: Annotated[Optional[StrictStr], Field(description="Specify a published date")] = None, - var_date: Annotated[Optional[StrictStr], Field(description="Specify a starting published date to filter with.")] = None, - var_date2: Annotated[Optional[StrictStr], Field(description="Specify an ending published date to filter with.")] = None, + var_date: Annotated[Optional[StrictStr], Field(description="Specify an exact published date to filter with.")] = None, updated_at_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting 'updated-at' date to filter with.")] = None, updated_at_end_date: Annotated[Optional[StrictStr], Field(description="Specify an ending 'updated-at' date to filter with.")] = None, last_mod_start_date: Annotated[Optional[StrictStr], Field(description="Specify a starting last modified date to filter with.")] = None, @@ -329675,10 +321489,8 @@ def index_zyxel_get_without_preload_content( :type botnet: str :param published: Specify a published date :type published: str - :param var_date: Specify a starting published date to filter with. + :param var_date: Specify an exact published date to filter with. :type var_date: str - :param var_date2: Specify an ending published date to filter with. - :type var_date2: str :param updated_at_start_date: Specify a starting 'updated-at' date to filter with. :type updated_at_start_date: str :param updated_at_end_date: Specify an ending 'updated-at' date to filter with. @@ -329732,7 +321544,6 @@ def index_zyxel_get_without_preload_content( botnet=botnet, published=published, var_date=var_date, - var_date2=var_date2, updated_at_start_date=updated_at_start_date, updated_at_end_date=updated_at_end_date, last_mod_start_date=last_mod_start_date, @@ -329777,7 +321588,6 @@ def _index_zyxel_get_serialize( botnet, published, var_date, - var_date2, updated_at_start_date, updated_at_end_date, last_mod_start_date, @@ -329878,10 +321688,6 @@ def _index_zyxel_get_serialize( _query_params.append(('date', var_date)) - if var_date2 is not None: - - _query_params.append(('date', var_date2)) - if updated_at_start_date is not None: _query_params.append(('updatedAtStartDate', updated_at_start_date)) diff --git a/vulncheck_sdk/api_client.py b/vulncheck_sdk/api_client.py index 0146fd92..27174e68 100644 --- a/vulncheck_sdk/api_client.py +++ b/vulncheck_sdk/api_client.py @@ -92,7 +92,7 @@ def __init__( self.default_headers[header_name] = header_value self.cookie = cookie # Set default User-Agent. - self.user_agent = 'OpenAPI-Generator/0.0.41/python' + self.user_agent = 'OpenAPI-Generator/0.0.42/python' self.client_side_validation = configuration.client_side_validation def __enter__(self): diff --git a/vulncheck_sdk/configuration.py b/vulncheck_sdk/configuration.py index 2c27a2d9..f8563a9b 100644 --- a/vulncheck_sdk/configuration.py +++ b/vulncheck_sdk/configuration.py @@ -537,7 +537,7 @@ def to_debug_report(self) -> str: "OS: {env}\n"\ "Python Version: {pyversion}\n"\ "Version of the API: 3.0\n"\ - "SDK Package Version: 0.0.41".\ + "SDK Package Version: 0.0.42".\ format(env=sys.platform, pyversion=sys.version) def get_host_settings(self) -> List[HostSetting]: @@ -548,7 +548,7 @@ def get_host_settings(self) -> List[HostSetting]: return [ { 'url': "/v3", - 'description': "No description provided", + 'description': "VulnCheck API v3", } ] diff --git a/vulncheck_sdk/models/__init__.py b/vulncheck_sdk/models/__init__.py index 4716cf27..3d10fd0b 100644 --- a/vulncheck_sdk/models/__init__.py +++ b/vulncheck_sdk/models/__init__.py @@ -160,13 +160,11 @@ from vulncheck_sdk.models.advisory_cve_detail import AdvisoryCVEDetail from vulncheck_sdk.models.advisory_cve_details_link import AdvisoryCVEDetailsLink from vulncheck_sdk.models.advisory_cve_reference import AdvisoryCVEReference -from vulncheck_sdk.models.advisory_cvrf_reference import AdvisoryCVRFReference from vulncheck_sdk.models.advisory_cvss import AdvisoryCVSS from vulncheck_sdk.models.advisory_cvssv2 import AdvisoryCVSSV2 from vulncheck_sdk.models.advisory_cvssv3 import AdvisoryCVSSV3 from vulncheck_sdk.models.advisory_cvssv40 import AdvisoryCVSSV40 from vulncheck_sdk.models.advisory_cvssv40_threat import AdvisoryCVSSV40Threat -from vulncheck_sdk.models.advisory_cwe_node import AdvisoryCWENode from vulncheck_sdk.models.advisory_canvas_exploit import AdvisoryCanvasExploit from vulncheck_sdk.models.advisory_capec import AdvisoryCapec from vulncheck_sdk.models.advisory_carestream_advisory import AdvisoryCarestreamAdvisory @@ -226,7 +224,6 @@ from vulncheck_sdk.models.advisory_dan_foss_cve_details import AdvisoryDanFossCVEDetails from vulncheck_sdk.models.advisory_danfoss import AdvisoryDanfoss from vulncheck_sdk.models.advisory_dassault import AdvisoryDassault -from vulncheck_sdk.models.advisory_date_time import AdvisoryDateTime from vulncheck_sdk.models.advisory_debian_cve import AdvisoryDebianCVE from vulncheck_sdk.models.advisory_debian_security_advisory import AdvisoryDebianSecurityAdvisory from vulncheck_sdk.models.advisory_dell import AdvisoryDell @@ -236,9 +233,7 @@ from vulncheck_sdk.models.advisory_distro_version import AdvisoryDistroVersion from vulncheck_sdk.models.advisory_django import AdvisoryDjango from vulncheck_sdk.models.advisory_document_metadata import AdvisoryDocumentMetadata -from vulncheck_sdk.models.advisory_document_note import AdvisoryDocumentNote from vulncheck_sdk.models.advisory_document_publisher import AdvisoryDocumentPublisher -from vulncheck_sdk.models.advisory_document_tracking import AdvisoryDocumentTracking from vulncheck_sdk.models.advisory_dot_cms import AdvisoryDotCMS from vulncheck_sdk.models.advisory_dragos_advisory import AdvisoryDragosAdvisory from vulncheck_sdk.models.advisory_draytek import AdvisoryDraytek @@ -353,7 +348,6 @@ from vulncheck_sdk.models.advisory_ip_intel_record import AdvisoryIpIntelRecord from vulncheck_sdk.models.advisory_israeli_alert import AdvisoryIsraeliAlert from vulncheck_sdk.models.advisory_israeli_vulnerability import AdvisoryIsraeliVulnerability -from vulncheck_sdk.models.advisory_issued import AdvisoryIssued from vulncheck_sdk.models.advisory_istio import AdvisoryIstio from vulncheck_sdk.models.advisory_ivanti import AdvisoryIvanti from vulncheck_sdk.models.advisory_ivanti_rss import AdvisoryIvantiRSS @@ -534,7 +528,6 @@ from vulncheck_sdk.models.advisory_product import AdvisoryProduct from vulncheck_sdk.models.advisory_product_branch import AdvisoryProductBranch from vulncheck_sdk.models.advisory_product_specific_detail import AdvisoryProductSpecificDetail -from vulncheck_sdk.models.advisory_product_tree import AdvisoryProductTree from vulncheck_sdk.models.advisory_products_affected import AdvisoryProductsAffected from vulncheck_sdk.models.advisory_progress import AdvisoryProgress from vulncheck_sdk.models.advisory_proofpoint import AdvisoryProofpoint @@ -564,12 +557,10 @@ from vulncheck_sdk.models.advisory_redhat_cve import AdvisoryRedhatCVE from vulncheck_sdk.models.advisory_reference import AdvisoryReference from vulncheck_sdk.models.advisory_related_rule import AdvisoryRelatedRule -from vulncheck_sdk.models.advisory_relationship import AdvisoryRelationship from vulncheck_sdk.models.advisory_remediation_data import AdvisoryRemediationData from vulncheck_sdk.models.advisory_renesas import AdvisoryRenesas from vulncheck_sdk.models.advisory_reported_exploit import AdvisoryReportedExploit from vulncheck_sdk.models.advisory_restart_data import AdvisoryRestartData -from vulncheck_sdk.models.advisory_revision import AdvisoryRevision from vulncheck_sdk.models.advisory_revision_history import AdvisoryRevisionHistory from vulncheck_sdk.models.advisory_revive import AdvisoryRevive from vulncheck_sdk.models.advisory_rhel_cve import AdvisoryRhelCVE @@ -603,7 +594,6 @@ from vulncheck_sdk.models.advisory_schneider_cve import AdvisorySchneiderCVE from vulncheck_sdk.models.advisory_schneider_electric_advisory import AdvisorySchneiderElectricAdvisory from vulncheck_sdk.models.advisory_schutzwerk import AdvisorySchutzwerk -from vulncheck_sdk.models.advisory_score_set import AdvisoryScoreSet from vulncheck_sdk.models.advisory_sec_fix import AdvisorySecFix from vulncheck_sdk.models.advisory_security_bulletin import AdvisorySecurityBulletin from vulncheck_sdk.models.advisory_security_lab import AdvisorySecurityLab @@ -655,7 +645,6 @@ from vulncheck_sdk.models.advisory_splunk import AdvisorySplunk from vulncheck_sdk.models.advisory_splunk_product import AdvisorySplunkProduct from vulncheck_sdk.models.advisory_spring import AdvisorySpring -from vulncheck_sdk.models.advisory_status import AdvisoryStatus from vulncheck_sdk.models.advisory_stormshield import AdvisoryStormshield from vulncheck_sdk.models.advisory_stryker_advisory import AdvisoryStrykerAdvisory from vulncheck_sdk.models.advisory_sudo import AdvisorySudo @@ -677,7 +666,6 @@ from vulncheck_sdk.models.advisory_thales import AdvisoryThales from vulncheck_sdk.models.advisory_the_missing_link import AdvisoryTheMissingLink from vulncheck_sdk.models.advisory_thermo_fisher import AdvisoryThermoFisher -from vulncheck_sdk.models.advisory_threat import AdvisoryThreat from vulncheck_sdk.models.advisory_threat_actor_with_external_objects import AdvisoryThreatActorWithExternalObjects from vulncheck_sdk.models.advisory_threat_data import AdvisoryThreatData from vulncheck_sdk.models.advisory_tibco import AdvisoryTibco @@ -698,7 +686,6 @@ from vulncheck_sdk.models.advisory_unify import AdvisoryUnify from vulncheck_sdk.models.advisory_unisoc import AdvisoryUnisoc from vulncheck_sdk.models.advisory_update import AdvisoryUpdate -from vulncheck_sdk.models.advisory_updated import AdvisoryUpdated from vulncheck_sdk.models.advisory_v3_acceptance_level import AdvisoryV3AcceptanceLevel from vulncheck_sdk.models.advisory_vccpe_dictionary import AdvisoryVCCPEDictionary from vulncheck_sdk.models.advisory_vc_vulnerable_cpes import AdvisoryVCVulnerableCPEs @@ -720,7 +707,6 @@ from vulncheck_sdk.models.advisory_vuln_check_config import AdvisoryVulnCheckConfig from vulncheck_sdk.models.advisory_vuln_check_kev import AdvisoryVulnCheckKEV from vulncheck_sdk.models.advisory_vuln_check_package import AdvisoryVulnCheckPackage -from vulncheck_sdk.models.advisory_vulnerability import AdvisoryVulnerability from vulncheck_sdk.models.advisory_vulnerable_debian_package import AdvisoryVulnerableDebianPackage from vulncheck_sdk.models.advisory_vulnerable_product import AdvisoryVulnerableProduct from vulncheck_sdk.models.advisory_vulnrichment import AdvisoryVulnrichment @@ -780,7 +766,6 @@ from vulncheck_sdk.models.api_configurations import ApiConfigurations from vulncheck_sdk.models.api_cve_items import ApiCveItems from vulncheck_sdk.models.api_cve_items_extended import ApiCveItemsExtended -from vulncheck_sdk.models.api_date_time import ApiDateTime from vulncheck_sdk.models.api_description import ApiDescription from vulncheck_sdk.models.api_description_data import ApiDescriptionData from vulncheck_sdk.models.api_epss import ApiEPSS diff --git a/vulncheck_sdk/models/advisory_adp_container.py b/vulncheck_sdk/models/advisory_adp_container.py index 31065b4a..cdb3df8e 100644 --- a/vulncheck_sdk/models/advisory_adp_container.py +++ b/vulncheck_sdk/models/advisory_adp_container.py @@ -40,7 +40,7 @@ class AdvisoryADPContainer(BaseModel): impacts: Optional[List[AdvisoryImpact]] = Field(default=None, description="OK") metrics: Optional[List[AdvisoryMetric]] = Field(default=None, description="OK") problem_types: Optional[List[AdvisoryMProblemTypes]] = Field(default=None, description="OK", alias="problemTypes") - provider_metadata: Optional[AdvisoryMProviderMetadata] = Field(default=None, description="OK", alias="providerMetadata") + provider_metadata: Optional[AdvisoryMProviderMetadata] = Field(default=None, alias="providerMetadata") references: Optional[List[AdvisoryMReference]] = None tags: Optional[List[StrictStr]] = Field(default=None, description="OK") title: Optional[StrictStr] = Field(default=None, description="OK") diff --git a/vulncheck_sdk/models/advisory_advisory_details.py b/vulncheck_sdk/models/advisory_advisory_details.py index fd5bee2f..8b6624de 100644 --- a/vulncheck_sdk/models/advisory_advisory_details.py +++ b/vulncheck_sdk/models/advisory_advisory_details.py @@ -21,9 +21,7 @@ from pydantic import BaseModel, ConfigDict, StrictStr from typing import Any, ClassVar, Dict, List, Optional from vulncheck_sdk.models.advisory_bugzilla import AdvisoryBugzilla -from vulncheck_sdk.models.advisory_issued import AdvisoryIssued from vulncheck_sdk.models.advisory_oval_cve import AdvisoryOvalCVE -from vulncheck_sdk.models.advisory_updated import AdvisoryUpdated from typing import Optional, Set from typing_extensions import Self @@ -33,9 +31,9 @@ class AdvisoryAdvisoryDetails(BaseModel): """ # noqa: E501 bugzilla: Optional[AdvisoryBugzilla] = None cve: Optional[AdvisoryOvalCVE] = None - issued: Optional[AdvisoryIssued] = None + issued: Optional[Dict[str, Any]] = None severity: Optional[StrictStr] = None - updated: Optional[AdvisoryUpdated] = None + updated: Optional[Dict[str, Any]] = None __properties: ClassVar[List[str]] = ["bugzilla", "cve", "issued", "severity", "updated"] model_config = ConfigDict( @@ -83,12 +81,6 @@ def to_dict(self) -> Dict[str, Any]: # override the default output from pydantic by calling `to_dict()` of cve if self.cve: _dict['cve'] = self.cve.to_dict() - # override the default output from pydantic by calling `to_dict()` of issued - if self.issued: - _dict['issued'] = self.issued.to_dict() - # override the default output from pydantic by calling `to_dict()` of updated - if self.updated: - _dict['updated'] = self.updated.to_dict() return _dict @classmethod @@ -103,9 +95,9 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: _obj = cls.model_validate({ "bugzilla": AdvisoryBugzilla.from_dict(obj["bugzilla"]) if obj.get("bugzilla") is not None else None, "cve": AdvisoryOvalCVE.from_dict(obj["cve"]) if obj.get("cve") is not None else None, - "issued": AdvisoryIssued.from_dict(obj["issued"]) if obj.get("issued") is not None else None, + "issued": obj.get("issued"), "severity": obj.get("severity"), - "updated": AdvisoryUpdated.from_dict(obj["updated"]) if obj.get("updated") is not None else None + "updated": obj.get("updated") }) return _obj diff --git a/vulncheck_sdk/models/advisory_affected.py b/vulncheck_sdk/models/advisory_affected.py index 83af3416..283f1e81 100644 --- a/vulncheck_sdk/models/advisory_affected.py +++ b/vulncheck_sdk/models/advisory_affected.py @@ -18,7 +18,7 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, Field, StrictStr +from pydantic import BaseModel, ConfigDict, StrictStr from typing import Any, ClassVar, Dict, List, Optional from vulncheck_sdk.models.advisory_osv_package import AdvisoryOSVPackage from vulncheck_sdk.models.advisory_range import AdvisoryRange @@ -30,8 +30,8 @@ class AdvisoryAffected(BaseModel): """ AdvisoryAffected """ # noqa: E501 - database_specific: Optional[Dict[str, Any]] = Field(default=None, description="The meaning of the values within the object is entirely defined by the database") - ecosystem_specific: Optional[Dict[str, Any]] = Field(default=None, description="The meaning of the values within the object is entirely defined by the ecosystem") + database_specific: Optional[Any] = None + ecosystem_specific: Optional[Any] = None package: Optional[AdvisoryOSVPackage] = None ranges: Optional[List[AdvisoryRange]] = None severity: Optional[List[AdvisorySeverity]] = None @@ -94,6 +94,16 @@ def to_dict(self) -> Dict[str, Any]: if _item_severity: _items.append(_item_severity.to_dict()) _dict['severity'] = _items + # set to None if database_specific (nullable) is None + # and model_fields_set contains the field + if self.database_specific is None and "database_specific" in self.model_fields_set: + _dict['database_specific'] = None + + # set to None if ecosystem_specific (nullable) is None + # and model_fields_set contains the field + if self.ecosystem_specific is None and "ecosystem_specific" in self.model_fields_set: + _dict['ecosystem_specific'] = None + return _dict @classmethod diff --git a/vulncheck_sdk/models/advisory_cisco_csaf.py b/vulncheck_sdk/models/advisory_cisco_csaf.py index 7d5e8ee7..20969763 100644 --- a/vulncheck_sdk/models/advisory_cisco_csaf.py +++ b/vulncheck_sdk/models/advisory_cisco_csaf.py @@ -27,7 +27,7 @@ class AdvisoryCiscoCSAF(BaseModel): """ AdvisoryCiscoCSAF """ # noqa: E501 - csaf: Optional[Dict[str, Any]] = None + csaf: Optional[Any] = None cve: Optional[List[StrictStr]] = None date_added: Optional[StrictStr] = None identifier: Optional[StrictStr] = None @@ -75,6 +75,11 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) + # set to None if csaf (nullable) is None + # and model_fields_set contains the field + if self.csaf is None and "csaf" in self.model_fields_set: + _dict['csaf'] = None + return _dict @classmethod diff --git a/vulncheck_sdk/models/advisory_csaf.py b/vulncheck_sdk/models/advisory_csaf.py index 0a7e6135..a27249b2 100644 --- a/vulncheck_sdk/models/advisory_csaf.py +++ b/vulncheck_sdk/models/advisory_csaf.py @@ -31,9 +31,9 @@ class AdvisoryCSAF(BaseModel): """ AdvisoryCSAF """ # noqa: E501 - document: Optional[AdvisoryDocumentMetadata] = Field(default=None, description="Document contains metadata about the CSAF document itself. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property") + document: Optional[AdvisoryDocumentMetadata] = None notes: Optional[List[AdvisoryCSAFNote]] = Field(default=None, description="Notes holds notes associated with the whole document. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#3217-document-property---notes") - product_tree: Optional[AdvisoryProductBranch] = Field(default=None, description="ProductTree contains information about the product tree (branches only). https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property") + product_tree: Optional[AdvisoryProductBranch] = None vulnerabilities: Optional[List[AdvisoryCSAFVulnerability]] = Field(default=None, description="Vulnerabilities contains information about the vulnerabilities, (i.e. CVEs), associated threats, and product status. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#323-vulnerabilities-property") __properties: ClassVar[List[str]] = ["document", "notes", "product_tree", "vulnerabilities"] diff --git a/vulncheck_sdk/models/advisory_cvrf.py b/vulncheck_sdk/models/advisory_cvrf.py index 74c8c8b4..6abcf70e 100644 --- a/vulncheck_sdk/models/advisory_cvrf.py +++ b/vulncheck_sdk/models/advisory_cvrf.py @@ -18,13 +18,8 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, Field, StrictStr +from pydantic import BaseModel, ConfigDict, StrictStr from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.models.advisory_cvrf_reference import AdvisoryCVRFReference -from vulncheck_sdk.models.advisory_document_note import AdvisoryDocumentNote -from vulncheck_sdk.models.advisory_document_tracking import AdvisoryDocumentTracking -from vulncheck_sdk.models.advisory_product_tree import AdvisoryProductTree -from vulncheck_sdk.models.advisory_vulnerability import AdvisoryVulnerability from typing import Optional, Set from typing_extensions import Self @@ -33,13 +28,7 @@ class AdvisoryCvrf(BaseModel): AdvisoryCvrf """ # noqa: E501 cve: Optional[List[StrictStr]] = None - notes: Optional[List[AdvisoryDocumentNote]] = None - product_tree: Optional[AdvisoryProductTree] = Field(default=None, alias="productTree") - references: Optional[List[AdvisoryCVRFReference]] = None - title: Optional[StrictStr] = None - tracking: Optional[AdvisoryDocumentTracking] = None - vulnerabilities: Optional[List[AdvisoryVulnerability]] = None - __properties: ClassVar[List[str]] = ["cve", "notes", "productTree", "references", "title", "tracking", "vulnerabilities"] + __properties: ClassVar[List[str]] = ["cve"] model_config = ConfigDict( populate_by_name=True, @@ -80,33 +69,6 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of each item in notes (list) - _items = [] - if self.notes: - for _item_notes in self.notes: - if _item_notes: - _items.append(_item_notes.to_dict()) - _dict['notes'] = _items - # override the default output from pydantic by calling `to_dict()` of product_tree - if self.product_tree: - _dict['productTree'] = self.product_tree.to_dict() - # override the default output from pydantic by calling `to_dict()` of each item in references (list) - _items = [] - if self.references: - for _item_references in self.references: - if _item_references: - _items.append(_item_references.to_dict()) - _dict['references'] = _items - # override the default output from pydantic by calling `to_dict()` of tracking - if self.tracking: - _dict['tracking'] = self.tracking.to_dict() - # override the default output from pydantic by calling `to_dict()` of each item in vulnerabilities (list) - _items = [] - if self.vulnerabilities: - for _item_vulnerabilities in self.vulnerabilities: - if _item_vulnerabilities: - _items.append(_item_vulnerabilities.to_dict()) - _dict['vulnerabilities'] = _items return _dict @classmethod @@ -119,13 +81,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "cve": obj.get("cve"), - "notes": [AdvisoryDocumentNote.from_dict(_item) for _item in obj["notes"]] if obj.get("notes") is not None else None, - "productTree": AdvisoryProductTree.from_dict(obj["productTree"]) if obj.get("productTree") is not None else None, - "references": [AdvisoryCVRFReference.from_dict(_item) for _item in obj["references"]] if obj.get("references") is not None else None, - "title": obj.get("title"), - "tracking": AdvisoryDocumentTracking.from_dict(obj["tracking"]) if obj.get("tracking") is not None else None, - "vulnerabilities": [AdvisoryVulnerability.from_dict(_item) for _item in obj["vulnerabilities"]] if obj.get("vulnerabilities") is not None else None + "cve": obj.get("cve") }) return _obj diff --git a/vulncheck_sdk/models/advisory_cvrf_reference.py b/vulncheck_sdk/models/advisory_cvrf_reference.py deleted file mode 100644 index e62a271a..00000000 --- a/vulncheck_sdk/models/advisory_cvrf_reference.py +++ /dev/null @@ -1,90 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryCVRFReference(BaseModel): - """ - AdvisoryCVRFReference - """ # noqa: E501 - description: Optional[StrictStr] = None - url: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["description", "url"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryCVRFReference from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryCVRFReference from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "description": obj.get("description"), - "url": obj.get("url") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_cvssv40.py b/vulncheck_sdk/models/advisory_cvssv40.py index fa7bf159..250e1c1e 100644 --- a/vulncheck_sdk/models/advisory_cvssv40.py +++ b/vulncheck_sdk/models/advisory_cvssv40.py @@ -25,7 +25,7 @@ class AdvisoryCVSSV40(BaseModel): """ - AdvisoryCVSSV40 + this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics """ # noqa: E501 automatable: Optional[StrictStr] = Field(default=None, alias="Automatable") recovery: Optional[StrictStr] = Field(default=None, alias="Recovery") diff --git a/vulncheck_sdk/models/advisory_cwe_node.py b/vulncheck_sdk/models/advisory_cwe_node.py deleted file mode 100644 index 477c9d42..00000000 --- a/vulncheck_sdk/models/advisory_cwe_node.py +++ /dev/null @@ -1,94 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryCWENode(BaseModel): - """ - AdvisoryCWENode - """ # noqa: E501 - cweid: Optional[StrictStr] = None - description: Optional[StrictStr] = None - id: Optional[StrictStr] = None - name: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["cweid", "description", "id", "name"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryCWENode from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryCWENode from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "cweid": obj.get("cweid"), - "description": obj.get("description"), - "id": obj.get("id"), - "name": obj.get("name") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_cwes.py b/vulncheck_sdk/models/advisory_cwes.py index 0560e081..83c91b1d 100644 --- a/vulncheck_sdk/models/advisory_cwes.py +++ b/vulncheck_sdk/models/advisory_cwes.py @@ -18,9 +18,8 @@ import re # noqa: F401 import json -from pydantic import BaseModel, ConfigDict, Field, StrictInt +from pydantic import BaseModel, ConfigDict from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.models.advisory_cwe_node import AdvisoryCWENode from typing import Optional, Set from typing_extensions import Self @@ -28,9 +27,8 @@ class AdvisoryCwes(BaseModel): """ AdvisoryCwes """ # noqa: E501 - nodes: Optional[List[AdvisoryCWENode]] = None - total_count: Optional[StrictInt] = Field(default=None, alias="totalCount") - __properties: ClassVar[List[str]] = ["nodes", "totalCount"] + nodes: Optional[List[Dict[str, Any]]] = None + __properties: ClassVar[List[str]] = ["nodes"] model_config = ConfigDict( populate_by_name=True, @@ -71,13 +69,6 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of each item in nodes (list) - _items = [] - if self.nodes: - for _item_nodes in self.nodes: - if _item_nodes: - _items.append(_item_nodes.to_dict()) - _dict['nodes'] = _items return _dict @classmethod @@ -90,8 +81,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: return cls.model_validate(obj) _obj = cls.model_validate({ - "nodes": [AdvisoryCWENode.from_dict(_item) for _item in obj["nodes"]] if obj.get("nodes") is not None else None, - "totalCount": obj.get("totalCount") + "nodes": obj.get("nodes") }) return _obj diff --git a/vulncheck_sdk/models/advisory_cycle.py b/vulncheck_sdk/models/advisory_cycle.py index 812309b2..8469a64f 100644 --- a/vulncheck_sdk/models/advisory_cycle.py +++ b/vulncheck_sdk/models/advisory_cycle.py @@ -29,16 +29,16 @@ class AdvisoryCycle(BaseModel): """ # noqa: E501 codename: Optional[StrictStr] = None cycle: Optional[StrictStr] = None - discontinued: Optional[Dict[str, Any]] = None - eol: Optional[Dict[str, Any]] = None - extended_support: Optional[Dict[str, Any]] = Field(default=None, alias="extendedSupport") + discontinued: Optional[Any] = None + eol: Optional[Any] = None + extended_support: Optional[Any] = Field(default=None, alias="extendedSupport") latest: Optional[StrictStr] = None latest_release_date: Optional[StrictStr] = Field(default=None, alias="latestReleaseDate") link: Optional[StrictStr] = None - lts: Optional[Dict[str, Any]] = None + lts: Optional[Any] = None release_date: Optional[StrictStr] = Field(default=None, alias="releaseDate") release_label: Optional[StrictStr] = Field(default=None, alias="releaseLabel") - support: Optional[Dict[str, Any]] = None + support: Optional[Any] = None __properties: ClassVar[List[str]] = ["codename", "cycle", "discontinued", "eol", "extendedSupport", "latest", "latestReleaseDate", "link", "lts", "releaseDate", "releaseLabel", "support"] model_config = ConfigDict( @@ -80,6 +80,31 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) + # set to None if discontinued (nullable) is None + # and model_fields_set contains the field + if self.discontinued is None and "discontinued" in self.model_fields_set: + _dict['discontinued'] = None + + # set to None if eol (nullable) is None + # and model_fields_set contains the field + if self.eol is None and "eol" in self.model_fields_set: + _dict['eol'] = None + + # set to None if extended_support (nullable) is None + # and model_fields_set contains the field + if self.extended_support is None and "extended_support" in self.model_fields_set: + _dict['extendedSupport'] = None + + # set to None if lts (nullable) is None + # and model_fields_set contains the field + if self.lts is None and "lts" in self.model_fields_set: + _dict['lts'] = None + + # set to None if support (nullable) is None + # and model_fields_set contains the field + if self.support is None and "support" in self.model_fields_set: + _dict['support'] = None + return _dict @classmethod diff --git a/vulncheck_sdk/models/advisory_date_time.py b/vulncheck_sdk/models/advisory_date_time.py deleted file mode 100644 index cd1d72b0..00000000 --- a/vulncheck_sdk/models/advisory_date_time.py +++ /dev/null @@ -1,88 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryDateTime(BaseModel): - """ - AdvisoryDateTime - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - __properties: ClassVar[List[str]] = ["date"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryDateTime from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryDateTime from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_document_metadata.py b/vulncheck_sdk/models/advisory_document_metadata.py index 9579c890..1dcecd21 100644 --- a/vulncheck_sdk/models/advisory_document_metadata.py +++ b/vulncheck_sdk/models/advisory_document_metadata.py @@ -29,7 +29,7 @@ class AdvisoryDocumentMetadata(BaseModel): """ - AdvisoryDocumentMetadata + Document contains metadata about the CSAF document itself. https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#321-document-property """ # noqa: E501 category: Optional[StrictStr] = None csaf_version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_document_note.py b/vulncheck_sdk/models/advisory_document_note.py deleted file mode 100644 index fbdc7eb4..00000000 --- a/vulncheck_sdk/models/advisory_document_note.py +++ /dev/null @@ -1,92 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryDocumentNote(BaseModel): - """ - AdvisoryDocumentNote - """ # noqa: E501 - text: Optional[StrictStr] = None - title: Optional[StrictStr] = None - type: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["text", "title", "type"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryDocumentNote from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryDocumentNote from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "text": obj.get("text"), - "title": obj.get("title"), - "type": obj.get("type") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_document_tracking.py b/vulncheck_sdk/models/advisory_document_tracking.py deleted file mode 100644 index 045ae657..00000000 --- a/vulncheck_sdk/models/advisory_document_tracking.py +++ /dev/null @@ -1,106 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.models.advisory_revision import AdvisoryRevision -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryDocumentTracking(BaseModel): - """ - AdvisoryDocumentTracking - """ # noqa: E501 - current_release_date: Optional[StrictStr] = Field(default=None, alias="currentReleaseDate") - id: Optional[StrictStr] = None - initial_release_date: Optional[StrictStr] = Field(default=None, alias="initialReleaseDate") - revision_history: Optional[List[AdvisoryRevision]] = Field(default=None, alias="revisionHistory") - status: Optional[StrictStr] = None - version: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["currentReleaseDate", "id", "initialReleaseDate", "revisionHistory", "status", "version"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryDocumentTracking from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - # override the default output from pydantic by calling `to_dict()` of each item in revision_history (list) - _items = [] - if self.revision_history: - for _item_revision_history in self.revision_history: - if _item_revision_history: - _items.append(_item_revision_history.to_dict()) - _dict['revisionHistory'] = _items - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryDocumentTracking from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "currentReleaseDate": obj.get("currentReleaseDate"), - "id": obj.get("id"), - "initialReleaseDate": obj.get("initialReleaseDate"), - "revisionHistory": [AdvisoryRevision.from_dict(_item) for _item in obj["revisionHistory"]] if obj.get("revisionHistory") is not None else None, - "status": obj.get("status"), - "version": obj.get("version") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_issued.py b/vulncheck_sdk/models/advisory_issued.py deleted file mode 100644 index 13353408..00000000 --- a/vulncheck_sdk/models/advisory_issued.py +++ /dev/null @@ -1,88 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryIssued(BaseModel): - """ - AdvisoryIssued - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - __properties: ClassVar[List[str]] = ["date"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryIssued from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryIssued from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_lol_advs.py b/vulncheck_sdk/models/advisory_lol_advs.py index a32b6eb9..7cd94f4d 100644 --- a/vulncheck_sdk/models/advisory_lol_advs.py +++ b/vulncheck_sdk/models/advisory_lol_advs.py @@ -31,7 +31,7 @@ class AdvisoryLolAdvs(BaseModel): date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None id: Optional[StrictStr] = None - lol_json: Optional[Dict[str, Dict[str, Any]]] = None + lol_json: Optional[Dict[str, Any]] = None mitre_id: Optional[StrictStr] = None references: Optional[List[StrictStr]] = None updated_at: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_m_provider_metadata.py b/vulncheck_sdk/models/advisory_m_provider_metadata.py index 4db58079..47991260 100644 --- a/vulncheck_sdk/models/advisory_m_provider_metadata.py +++ b/vulncheck_sdk/models/advisory_m_provider_metadata.py @@ -25,7 +25,7 @@ class AdvisoryMProviderMetadata(BaseModel): """ - AdvisoryMProviderMetadata + OK """ # noqa: E501 date_updated: Optional[StrictStr] = Field(default=None, description="FIXME: flip to time", alias="dateUpdated") org_id: Optional[StrictStr] = Field(default=None, alias="orgId") diff --git a/vulncheck_sdk/models/advisory_microsoft_driver_block_list.py b/vulncheck_sdk/models/advisory_microsoft_driver_block_list.py index 807523aa..4c03790f 100644 --- a/vulncheck_sdk/models/advisory_microsoft_driver_block_list.py +++ b/vulncheck_sdk/models/advisory_microsoft_driver_block_list.py @@ -30,7 +30,7 @@ class AdvisoryMicrosoftDriverBlockList(BaseModel): """ # noqa: E501 date_added: Optional[StrictStr] = None file_id: Optional[StrictStr] = Field(default=None, description="From FileAttrib or Deny") - file_metadata: Optional[AdvisoryMicrosoftFileMetadata] = Field(default=None, description="File-level metadata") + file_metadata: Optional[AdvisoryMicrosoftFileMetadata] = None __properties: ClassVar[List[str]] = ["date_added", "file_id", "file_metadata"] model_config = ConfigDict( diff --git a/vulncheck_sdk/models/advisory_microsoft_file_metadata.py b/vulncheck_sdk/models/advisory_microsoft_file_metadata.py index 6bd15b5a..3b890ed9 100644 --- a/vulncheck_sdk/models/advisory_microsoft_file_metadata.py +++ b/vulncheck_sdk/models/advisory_microsoft_file_metadata.py @@ -25,7 +25,7 @@ class AdvisoryMicrosoftFileMetadata(BaseModel): """ - AdvisoryMicrosoftFileMetadata + File-level metadata """ # noqa: E501 file_name: Optional[StrictStr] = Field(default=None, description="Full path (FilePath + FileName or FriendlyName)") maximum_file_version: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_product_branch.py b/vulncheck_sdk/models/advisory_product_branch.py index c0df8ac5..6946cc71 100644 --- a/vulncheck_sdk/models/advisory_product_branch.py +++ b/vulncheck_sdk/models/advisory_product_branch.py @@ -27,7 +27,7 @@ class AdvisoryProductBranch(BaseModel): """ - AdvisoryProductBranch + ProductTree contains information about the product tree (branches only). https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html#322-product-tree-property """ # noqa: E501 branches: Optional[List[AdvisoryProductBranch]] = None category: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/advisory_product_tree.py b/vulncheck_sdk/models/advisory_product_tree.py deleted file mode 100644 index bc7bc3c1..00000000 --- a/vulncheck_sdk/models/advisory_product_tree.py +++ /dev/null @@ -1,96 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict -from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.models.advisory_relationship import AdvisoryRelationship -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryProductTree(BaseModel): - """ - AdvisoryProductTree - """ # noqa: E501 - relationships: Optional[List[AdvisoryRelationship]] = None - __properties: ClassVar[List[str]] = ["relationships"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryProductTree from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - # override the default output from pydantic by calling `to_dict()` of each item in relationships (list) - _items = [] - if self.relationships: - for _item_relationships in self.relationships: - if _item_relationships: - _items.append(_item_relationships.to_dict()) - _dict['relationships'] = _items - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryProductTree from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "relationships": [AdvisoryRelationship.from_dict(_item) for _item in obj["relationships"]] if obj.get("relationships") is not None else None - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_relationship.py b/vulncheck_sdk/models/advisory_relationship.py deleted file mode 100644 index d921e8c5..00000000 --- a/vulncheck_sdk/models/advisory_relationship.py +++ /dev/null @@ -1,92 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryRelationship(BaseModel): - """ - AdvisoryRelationship - """ # noqa: E501 - product_reference: Optional[StrictStr] = Field(default=None, alias="productReference") - relates_to_product_reference: Optional[StrictStr] = Field(default=None, alias="relatesToProductReference") - relation_type: Optional[StrictStr] = Field(default=None, alias="relationType") - __properties: ClassVar[List[str]] = ["productReference", "relatesToProductReference", "relationType"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryRelationship from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryRelationship from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "productReference": obj.get("productReference"), - "relatesToProductReference": obj.get("relatesToProductReference"), - "relationType": obj.get("relationType") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_revision.py b/vulncheck_sdk/models/advisory_revision.py deleted file mode 100644 index 66a2d956..00000000 --- a/vulncheck_sdk/models/advisory_revision.py +++ /dev/null @@ -1,92 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryRevision(BaseModel): - """ - AdvisoryRevision - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - description: Optional[StrictStr] = None - number: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["date", "description", "number"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryRevision from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryRevision from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date"), - "description": obj.get("description"), - "number": obj.get("number") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_score_set.py b/vulncheck_sdk/models/advisory_score_set.py deleted file mode 100644 index 3de08b7f..00000000 --- a/vulncheck_sdk/models/advisory_score_set.py +++ /dev/null @@ -1,90 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryScoreSet(BaseModel): - """ - AdvisoryScoreSet - """ # noqa: E501 - base_score: Optional[StrictStr] = Field(default=None, alias="baseScore") - vector: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["baseScore", "vector"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryScoreSet from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryScoreSet from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "baseScore": obj.get("baseScore"), - "vector": obj.get("vector") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_status.py b/vulncheck_sdk/models/advisory_status.py deleted file mode 100644 index 12b62e4a..00000000 --- a/vulncheck_sdk/models/advisory_status.py +++ /dev/null @@ -1,90 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryStatus(BaseModel): - """ - AdvisoryStatus - """ # noqa: E501 - product_id: Optional[List[StrictStr]] = Field(default=None, alias="productID") - type: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["productID", "type"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryStatus from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryStatus from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "productID": obj.get("productID"), - "type": obj.get("type") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_threat.py b/vulncheck_sdk/models/advisory_threat.py deleted file mode 100644 index dab6ea5e..00000000 --- a/vulncheck_sdk/models/advisory_threat.py +++ /dev/null @@ -1,90 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryThreat(BaseModel): - """ - AdvisoryThreat - """ # noqa: E501 - severity: Optional[StrictStr] = None - type: Optional[StrictStr] = None - __properties: ClassVar[List[str]] = ["severity", "type"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryThreat from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryThreat from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "severity": obj.get("severity"), - "type": obj.get("type") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_update.py b/vulncheck_sdk/models/advisory_update.py index a5f4b3d3..aa44e60a 100644 --- a/vulncheck_sdk/models/advisory_update.py +++ b/vulncheck_sdk/models/advisory_update.py @@ -20,7 +20,6 @@ from pydantic import BaseModel, ConfigDict, Field, StrictStr from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.models.advisory_date_time import AdvisoryDateTime from vulncheck_sdk.models.advisory_package import AdvisoryPackage from vulncheck_sdk.models.advisory_reference import AdvisoryReference from typing import Optional, Set @@ -34,7 +33,7 @@ class AdvisoryUpdate(BaseModel): date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None id: Optional[StrictStr] = Field(default=None, description="sort // key") - issued: Optional[AdvisoryDateTime] = None + issued: Optional[Dict[str, Any]] = None os_arch: Optional[StrictStr] = None os_version: Optional[StrictStr] = None packages: Optional[List[AdvisoryPackage]] = None @@ -42,7 +41,7 @@ class AdvisoryUpdate(BaseModel): severity: Optional[StrictStr] = None title: Optional[StrictStr] = None type: Optional[StrictStr] = None - updated: Optional[AdvisoryDateTime] = None + updated: Optional[Dict[str, Any]] = None __properties: ClassVar[List[str]] = ["cve", "date_added", "description", "id", "issued", "os_arch", "os_version", "packages", "references", "severity", "title", "type", "updated"] model_config = ConfigDict( @@ -84,9 +83,6 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of issued - if self.issued: - _dict['issued'] = self.issued.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in packages (list) _items = [] if self.packages: @@ -101,9 +97,6 @@ def to_dict(self) -> Dict[str, Any]: if _item_references: _items.append(_item_references.to_dict()) _dict['references'] = _items - # override the default output from pydantic by calling `to_dict()` of updated - if self.updated: - _dict['updated'] = self.updated.to_dict() return _dict @classmethod @@ -120,7 +113,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "date_added": obj.get("date_added"), "description": obj.get("description"), "id": obj.get("id"), - "issued": AdvisoryDateTime.from_dict(obj["issued"]) if obj.get("issued") is not None else None, + "issued": obj.get("issued"), "os_arch": obj.get("os_arch"), "os_version": obj.get("os_version"), "packages": [AdvisoryPackage.from_dict(_item) for _item in obj["packages"]] if obj.get("packages") is not None else None, @@ -128,7 +121,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "severity": obj.get("severity"), "title": obj.get("title"), "type": obj.get("type"), - "updated": AdvisoryDateTime.from_dict(obj["updated"]) if obj.get("updated") is not None else None + "updated": obj.get("updated") }) return _obj diff --git a/vulncheck_sdk/models/advisory_updated.py b/vulncheck_sdk/models/advisory_updated.py deleted file mode 100644 index 7d63dbe0..00000000 --- a/vulncheck_sdk/models/advisory_updated.py +++ /dev/null @@ -1,88 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryUpdated(BaseModel): - """ - AdvisoryUpdated - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - __properties: ClassVar[List[str]] = ["date"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryUpdated from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryUpdated from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date") - }) - return _obj - - diff --git a/vulncheck_sdk/models/advisory_vulnerability.py b/vulncheck_sdk/models/advisory_vulnerability.py deleted file mode 100644 index fff51956..00000000 --- a/vulncheck_sdk/models/advisory_vulnerability.py +++ /dev/null @@ -1,136 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.models.advisory_cvrf_reference import AdvisoryCVRFReference -from vulncheck_sdk.models.advisory_score_set import AdvisoryScoreSet -from vulncheck_sdk.models.advisory_status import AdvisoryStatus -from vulncheck_sdk.models.advisory_threat import AdvisoryThreat -from vulncheck_sdk.models.advisory_vuln_check_package import AdvisoryVulnCheckPackage -from typing import Optional, Set -from typing_extensions import Self - -class AdvisoryVulnerability(BaseModel): - """ - AdvisoryVulnerability - """ # noqa: E501 - cve: Optional[StrictStr] = None - cvssscore_sets: Optional[AdvisoryScoreSet] = Field(default=None, alias="cvssscoreSets") - description: Optional[StrictStr] = None - packages: Optional[List[AdvisoryVulnCheckPackage]] = Field(default=None, description="vulncheck addition") - product_statuses: Optional[List[AdvisoryStatus]] = Field(default=None, alias="productStatuses") - references: Optional[List[AdvisoryCVRFReference]] = None - threats: Optional[List[AdvisoryThreat]] = None - __properties: ClassVar[List[str]] = ["cve", "cvssscoreSets", "description", "packages", "productStatuses", "references", "threats"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of AdvisoryVulnerability from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - # override the default output from pydantic by calling `to_dict()` of cvssscore_sets - if self.cvssscore_sets: - _dict['cvssscoreSets'] = self.cvssscore_sets.to_dict() - # override the default output from pydantic by calling `to_dict()` of each item in packages (list) - _items = [] - if self.packages: - for _item_packages in self.packages: - if _item_packages: - _items.append(_item_packages.to_dict()) - _dict['packages'] = _items - # override the default output from pydantic by calling `to_dict()` of each item in product_statuses (list) - _items = [] - if self.product_statuses: - for _item_product_statuses in self.product_statuses: - if _item_product_statuses: - _items.append(_item_product_statuses.to_dict()) - _dict['productStatuses'] = _items - # override the default output from pydantic by calling `to_dict()` of each item in references (list) - _items = [] - if self.references: - for _item_references in self.references: - if _item_references: - _items.append(_item_references.to_dict()) - _dict['references'] = _items - # override the default output from pydantic by calling `to_dict()` of each item in threats (list) - _items = [] - if self.threats: - for _item_threats in self.threats: - if _item_threats: - _items.append(_item_threats.to_dict()) - _dict['threats'] = _items - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of AdvisoryVulnerability from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "cve": obj.get("cve"), - "cvssscoreSets": AdvisoryScoreSet.from_dict(obj["cvssscoreSets"]) if obj.get("cvssscoreSets") is not None else None, - "description": obj.get("description"), - "packages": [AdvisoryVulnCheckPackage.from_dict(_item) for _item in obj["packages"]] if obj.get("packages") is not None else None, - "productStatuses": [AdvisoryStatus.from_dict(_item) for _item in obj["productStatuses"]] if obj.get("productStatuses") is not None else None, - "references": [AdvisoryCVRFReference.from_dict(_item) for _item in obj["references"]] if obj.get("references") is not None else None, - "threats": [AdvisoryThreat.from_dict(_item) for _item in obj["threats"]] if obj.get("threats") is not None else None - }) - return _obj - - diff --git a/vulncheck_sdk/models/api_date_time.py b/vulncheck_sdk/models/api_date_time.py deleted file mode 100644 index 1fd4a11d..00000000 --- a/vulncheck_sdk/models/api_date_time.py +++ /dev/null @@ -1,88 +0,0 @@ -# coding: utf-8 - -""" - VulnCheck API - - Version 3 of the VulnCheck API - - The version of the OpenAPI document: 3.0 - Contact: support@vulncheck.com - Generated by OpenAPI Generator (https://openapi-generator.tech) - - Do not edit the class manually. -""" # noqa: E501 - - -from __future__ import annotations -import pprint -import re # noqa: F401 -import json - -from pydantic import BaseModel, ConfigDict, Field, StrictStr -from typing import Any, ClassVar, Dict, List, Optional -from typing import Optional, Set -from typing_extensions import Self - -class ApiDateTime(BaseModel): - """ - ApiDateTime - """ # noqa: E501 - var_date: Optional[StrictStr] = Field(default=None, alias="date") - __properties: ClassVar[List[str]] = ["date"] - - model_config = ConfigDict( - populate_by_name=True, - validate_assignment=True, - protected_namespaces=(), - ) - - - def to_str(self) -> str: - """Returns the string representation of the model using alias""" - return pprint.pformat(self.model_dump(by_alias=True)) - - def to_json(self) -> str: - """Returns the JSON representation of the model using alias""" - # TODO: pydantic v2: use .model_dump_json(by_alias=True, exclude_unset=True) instead - return json.dumps(self.to_dict()) - - @classmethod - def from_json(cls, json_str: str) -> Optional[Self]: - """Create an instance of ApiDateTime from a JSON string""" - return cls.from_dict(json.loads(json_str)) - - def to_dict(self) -> Dict[str, Any]: - """Return the dictionary representation of the model using alias. - - This has the following differences from calling pydantic's - `self.model_dump(by_alias=True)`: - - * `None` is only added to the output dict for nullable fields that - were set at model initialization. Other fields with value `None` - are ignored. - """ - excluded_fields: Set[str] = set([ - ]) - - _dict = self.model_dump( - by_alias=True, - exclude=excluded_fields, - exclude_none=True, - ) - return _dict - - @classmethod - def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: - """Create an instance of ApiDateTime from a dict""" - if obj is None: - return None - - if not isinstance(obj, dict): - return cls.model_validate(obj) - - _obj = cls.model_validate({ - "date": obj.get("date") - }) - return _obj - - diff --git a/vulncheck_sdk/models/api_epss.py b/vulncheck_sdk/models/api_epss.py index 3b5069f3..d38fb8a8 100644 --- a/vulncheck_sdk/models/api_epss.py +++ b/vulncheck_sdk/models/api_epss.py @@ -25,7 +25,7 @@ class ApiEPSS(BaseModel): """ - ApiEPSS + exclude EPSS from changelog """ # noqa: E501 epss_percentile: Optional[Union[StrictFloat, StrictInt]] = None epss_score: Optional[Union[StrictFloat, StrictInt]] = None diff --git a/vulncheck_sdk/models/api_exploit_v3_result.py b/vulncheck_sdk/models/api_exploit_v3_result.py index 65a61cdb..f55bd9b0 100644 --- a/vulncheck_sdk/models/api_exploit_v3_result.py +++ b/vulncheck_sdk/models/api_exploit_v3_result.py @@ -37,7 +37,7 @@ class ApiExploitV3Result(BaseModel): commercial_exploit_found: Optional[StrictBool] = None counts: Optional[ApiExploitsV3Count] = None date_added: Optional[StrictStr] = None - epss: Optional[ApiEPSS] = Field(default=None, description="exclude EPSS from changelog") + epss: Optional[ApiEPSS] = None exploits: Optional[List[ApiNormalizedExploitV3Entry]] = None id: Optional[StrictStr] = None in_kev: Optional[StrictBool] = Field(default=None, alias="inKEV") diff --git a/vulncheck_sdk/models/api_exploits_change.py b/vulncheck_sdk/models/api_exploits_change.py index 185c98cc..85315dbf 100644 --- a/vulncheck_sdk/models/api_exploits_change.py +++ b/vulncheck_sdk/models/api_exploits_change.py @@ -30,8 +30,8 @@ class ApiExploitsChange(BaseModel): change_time: Optional[StrictStr] = None change_type: Optional[StrictStr] = None var_field: Optional[StrictStr] = Field(default=None, alias="field") - new_value: Optional[Dict[str, Any]] = None - old_value: Optional[Dict[str, Any]] = None + new_value: Optional[Any] = None + old_value: Optional[Any] = None __properties: ClassVar[List[str]] = ["change_time", "change_type", "field", "new_value", "old_value"] model_config = ConfigDict( @@ -73,6 +73,16 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) + # set to None if new_value (nullable) is None + # and model_fields_set contains the field + if self.new_value is None and "new_value" in self.model_fields_set: + _dict['new_value'] = None + + # set to None if old_value (nullable) is None + # and model_fields_set contains the field + if self.old_value is None and "old_value" in self.model_fields_set: + _dict['old_value'] = None + return _dict @classmethod diff --git a/vulncheck_sdk/models/api_impact.py b/vulncheck_sdk/models/api_impact.py index 4e37b1bb..69900451 100644 --- a/vulncheck_sdk/models/api_impact.py +++ b/vulncheck_sdk/models/api_impact.py @@ -32,7 +32,7 @@ class ApiImpact(BaseModel): """ # noqa: E501 base_metric_v2: Optional[ApiBaseMetricV2] = Field(default=None, alias="baseMetricV2") base_metric_v3: Optional[ApiBaseMetricV3] = Field(default=None, alias="baseMetricV3") - metric_v40: Optional[AdvisoryCVSSV40] = Field(default=None, description="this isn't called baseMetric, because it can contain other metrics -- typically supplemental metrics", alias="metricV40") + metric_v40: Optional[AdvisoryCVSSV40] = Field(default=None, alias="metricV40") __properties: ClassVar[List[str]] = ["baseMetricV2", "baseMetricV3", "metricV40"] model_config = ConfigDict( diff --git a/vulncheck_sdk/models/api_update.py b/vulncheck_sdk/models/api_update.py index a35d5986..2c571eab 100644 --- a/vulncheck_sdk/models/api_update.py +++ b/vulncheck_sdk/models/api_update.py @@ -20,7 +20,6 @@ from pydantic import BaseModel, ConfigDict, Field, StrictStr from typing import Any, ClassVar, Dict, List, Optional -from vulncheck_sdk.models.api_date_time import ApiDateTime from vulncheck_sdk.models.api_package import ApiPackage from vulncheck_sdk.models.api_reference import ApiReference from typing import Optional, Set @@ -34,7 +33,7 @@ class ApiUpdate(BaseModel): date_added: Optional[StrictStr] = None description: Optional[StrictStr] = None id: Optional[StrictStr] = Field(default=None, description="sort // key") - issued: Optional[ApiDateTime] = None + issued: Optional[Dict[str, Any]] = None os_arch: Optional[StrictStr] = None os_version: Optional[StrictStr] = None packages: Optional[List[ApiPackage]] = None @@ -42,7 +41,7 @@ class ApiUpdate(BaseModel): severity: Optional[StrictStr] = None title: Optional[StrictStr] = None type: Optional[StrictStr] = None - updated: Optional[ApiDateTime] = None + updated: Optional[Dict[str, Any]] = None __properties: ClassVar[List[str]] = ["cve", "date_added", "description", "id", "issued", "os_arch", "os_version", "packages", "references", "severity", "title", "type", "updated"] model_config = ConfigDict( @@ -84,9 +83,6 @@ def to_dict(self) -> Dict[str, Any]: exclude=excluded_fields, exclude_none=True, ) - # override the default output from pydantic by calling `to_dict()` of issued - if self.issued: - _dict['issued'] = self.issued.to_dict() # override the default output from pydantic by calling `to_dict()` of each item in packages (list) _items = [] if self.packages: @@ -101,9 +97,6 @@ def to_dict(self) -> Dict[str, Any]: if _item_references: _items.append(_item_references.to_dict()) _dict['references'] = _items - # override the default output from pydantic by calling `to_dict()` of updated - if self.updated: - _dict['updated'] = self.updated.to_dict() return _dict @classmethod @@ -120,7 +113,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "date_added": obj.get("date_added"), "description": obj.get("description"), "id": obj.get("id"), - "issued": ApiDateTime.from_dict(obj["issued"]) if obj.get("issued") is not None else None, + "issued": obj.get("issued"), "os_arch": obj.get("os_arch"), "os_version": obj.get("os_version"), "packages": [ApiPackage.from_dict(_item) for _item in obj["packages"]] if obj.get("packages") is not None else None, @@ -128,7 +121,7 @@ def from_dict(cls, obj: Optional[Dict[str, Any]]) -> Optional[Self]: "severity": obj.get("severity"), "title": obj.get("title"), "type": obj.get("type"), - "updated": ApiDateTime.from_dict(obj["updated"]) if obj.get("updated") is not None else None + "updated": obj.get("updated") }) return _obj diff --git a/vulncheck_sdk/models/purl_batch_vuln_finding.py b/vulncheck_sdk/models/purl_batch_vuln_finding.py index b9618c92..b4d7a0b7 100644 --- a/vulncheck_sdk/models/purl_batch_vuln_finding.py +++ b/vulncheck_sdk/models/purl_batch_vuln_finding.py @@ -32,7 +32,7 @@ class PurlBatchVulnFinding(BaseModel): """ # noqa: E501 cves: Optional[List[StrictStr]] = Field(default=None, description="list of associated CVE 's") purl: Optional[StrictStr] = Field(default=None, description="the purl, ex. hex/coherence@0.1.2") - purl_struct: Optional[PurlPackageURLJSON] = Field(default=None, description="meta-data about the purl") + purl_struct: Optional[PurlPackageURLJSON] = None research_attributes: Optional[ApiOSSPackageResearchAttributes] = None vulnerabilities: Optional[List[ApiOSSPackageVulnerability]] = Field(default=None, description="list of associated vulnerabilities") __properties: ClassVar[List[str]] = ["cves", "purl", "purl_struct", "research_attributes", "vulnerabilities"] diff --git a/vulncheck_sdk/models/purl_package_urljson.py b/vulncheck_sdk/models/purl_package_urljson.py index dd8b3b90..4e2be31d 100644 --- a/vulncheck_sdk/models/purl_package_urljson.py +++ b/vulncheck_sdk/models/purl_package_urljson.py @@ -26,7 +26,7 @@ class PurlPackageURLJSON(BaseModel): """ - PurlPackageURLJSON + meta-data about the purl """ # noqa: E501 name: Optional[StrictStr] = None namespace: Optional[StrictStr] = None diff --git a/vulncheck_sdk/models/v3controllers_purl_response_metadata.py b/vulncheck_sdk/models/v3controllers_purl_response_metadata.py index c669ed04..0dbc7939 100644 --- a/vulncheck_sdk/models/v3controllers_purl_response_metadata.py +++ b/vulncheck_sdk/models/v3controllers_purl_response_metadata.py @@ -28,7 +28,7 @@ class V3controllersPurlResponseMetadata(BaseModel): """ V3controllersPurlResponseMetadata """ # noqa: E501 - purl_struct: Optional[PurlPackageURLJSON] = Field(default=None, description="meta-data about the purl") + purl_struct: Optional[PurlPackageURLJSON] = None timestamp: Optional[StrictStr] = Field(default=None, description="time of the transaction") total_documents: Optional[StrictInt] = Field(default=None, description="number of results found") __properties: ClassVar[List[str]] = ["purl_struct", "timestamp", "total_documents"]